Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 02:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1d2adaabf198d26f9cb17e7afc873387.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1d2adaabf198d26f9cb17e7afc873387.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1d2adaabf198d26f9cb17e7afc873387.exe
-
Size
2.3MB
-
MD5
1d2adaabf198d26f9cb17e7afc873387
-
SHA1
6d6501fa2475ccfaa049dea6b996dc757fdfc7b9
-
SHA256
a51e91ac7de75fb3a814387fb5f45948fa6afd2468db975fcda24889eb99c8a0
-
SHA512
0e9206e8c5e2adbdd9ee27f246cc951e96f4d3004501abbdcf6fa8ad88f7c2c055b73c4ffb5718b76f111d4bc9c1b5a5f35f7c45333eb87beaa1f793b495d4b9
-
SSDEEP
49152:Ux6h57Kp1amL0VUCrTASC0xsPDkCpFW7EDlCDcRE0hZPBEvPS:3p6LtwTASCfPDkEdDWeBB9
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023c77-111.dat family_ardamax -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" hidde2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" services.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run hidde2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" hidde2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" services.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y} hidde2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ hidde2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" hidde2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" services.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation hidde1.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation JaffaCakes118_1d2adaabf198d26f9cb17e7afc873387.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation hidden12.exe.exe -
Executes dropped EXE 9 IoCs
pid Process 1476 PEncrypt4.exe.exe 4688 hidden12.exe.exe 4372 hide.exe 4820 hidde2.exe 4320 hide1.exe 2992 hidde1.exe 1640 fservice.exe 2320 services.exe 932 GBKH.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine hide1.exe -
Loads dropped DLL 21 IoCs
pid Process 2992 hidde1.exe 2320 services.exe 2320 services.exe 2320 services.exe 1640 fservice.exe 4820 hidde2.exe 2992 hidde1.exe 2992 hidde1.exe 1476 PEncrypt4.exe.exe 932 GBKH.exe 932 GBKH.exe 932 GBKH.exe 932 GBKH.exe 932 GBKH.exe 2320 services.exe 2320 services.exe 4372 hide.exe 1476 PEncrypt4.exe.exe 1476 PEncrypt4.exe.exe 1476 PEncrypt4.exe.exe 1476 PEncrypt4.exe.exe -
resource yara_rule behavioral2/files/0x0008000000023c62-39.dat themida behavioral2/memory/4320-50-0x0000000000400000-0x00000000006A2000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rundll = "c:\\windows\\system32\\kill.exe" hide.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GBKH Agent = "C:\\Windows\\SysWOW64\\28463\\GBKH.exe" GBKH.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ hidde2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ services.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\kill.exe hide.exe File created C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\reginv.dll services.exe File created C:\Windows\SysWOW64\28463\GBKH.exe hidde1.exe File opened for modification \??\c:\windows\SysWOW64\kill.exe hide.exe File opened for modification C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\winkey.dll services.exe File created C:\Windows\SysWOW64\fservice.exe services.exe File opened for modification C:\Windows\SysWOW64\fservice.exe hidde2.exe File created C:\Windows\SysWOW64\fservice.exe hidde2.exe File created C:\Windows\SysWOW64\28463\GBKH.001 hidde1.exe File created C:\Windows\SysWOW64\28463\GBKH.006 hidde1.exe File created C:\Windows\SysWOW64\28463\GBKH.007 hidde1.exe File created C:\Windows\SysWOW64\28463\AKV.exe hidde1.exe File opened for modification C:\Windows\SysWOW64\28463 GBKH.exe -
resource yara_rule behavioral2/files/0x0007000000023c67-37.dat upx behavioral2/memory/4820-44-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral2/memory/2320-75-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral2/memory/1640-91-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral2/memory/4820-95-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral2/memory/2320-103-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral2/memory/2320-136-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral2/memory/2320-142-0x0000000000400000-0x00000000005FF000-memory.dmp upx -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\system\sservice.exe hidde2.exe File opened for modification C:\Windows\services.exe fservice.exe File created C:\Windows\system\sservice.exe fservice.exe File created C:\Windows\hidde2.exe.bat hidde2.exe File created C:\Windows\hide1.exe hidden12.exe.exe File created C:\Windows\system\sservice.exe hidde2.exe File created C:\Windows\hidde1.exe hidden12.exe.exe File created C:\Windows\services.exe fservice.exe File opened for modification C:\Windows\system\sservice.exe fservice.exe File created C:\Windows\system\sservice.exe services.exe File created C:\Windows\hide.exe hidden12.exe.exe File created C:\Windows\hidde2.exe hidden12.exe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GBKH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1d2adaabf198d26f9cb17e7afc873387.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hidden12.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hide.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hidde2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PEncrypt4.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hide1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hidde1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe 4372 hide.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 932 GBKH.exe Token: SeIncBasePriorityPrivilege 932 GBKH.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2320 services.exe 2320 services.exe 932 GBKH.exe 932 GBKH.exe 932 GBKH.exe 932 GBKH.exe 932 GBKH.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 5012 wrote to memory of 1476 5012 JaffaCakes118_1d2adaabf198d26f9cb17e7afc873387.exe 83 PID 5012 wrote to memory of 1476 5012 JaffaCakes118_1d2adaabf198d26f9cb17e7afc873387.exe 83 PID 5012 wrote to memory of 1476 5012 JaffaCakes118_1d2adaabf198d26f9cb17e7afc873387.exe 83 PID 5012 wrote to memory of 4688 5012 JaffaCakes118_1d2adaabf198d26f9cb17e7afc873387.exe 84 PID 5012 wrote to memory of 4688 5012 JaffaCakes118_1d2adaabf198d26f9cb17e7afc873387.exe 84 PID 5012 wrote to memory of 4688 5012 JaffaCakes118_1d2adaabf198d26f9cb17e7afc873387.exe 84 PID 4688 wrote to memory of 4372 4688 hidden12.exe.exe 85 PID 4688 wrote to memory of 4372 4688 hidden12.exe.exe 85 PID 4688 wrote to memory of 4372 4688 hidden12.exe.exe 85 PID 4688 wrote to memory of 4820 4688 hidden12.exe.exe 86 PID 4688 wrote to memory of 4820 4688 hidden12.exe.exe 86 PID 4688 wrote to memory of 4820 4688 hidden12.exe.exe 86 PID 4688 wrote to memory of 4320 4688 hidden12.exe.exe 87 PID 4688 wrote to memory of 4320 4688 hidden12.exe.exe 87 PID 4688 wrote to memory of 4320 4688 hidden12.exe.exe 87 PID 4688 wrote to memory of 2992 4688 hidden12.exe.exe 88 PID 4688 wrote to memory of 2992 4688 hidden12.exe.exe 88 PID 4688 wrote to memory of 2992 4688 hidden12.exe.exe 88 PID 4820 wrote to memory of 1640 4820 hidde2.exe 89 PID 4820 wrote to memory of 1640 4820 hidde2.exe 89 PID 4820 wrote to memory of 1640 4820 hidde2.exe 89 PID 1640 wrote to memory of 2320 1640 fservice.exe 90 PID 1640 wrote to memory of 2320 1640 fservice.exe 90 PID 1640 wrote to memory of 2320 1640 fservice.exe 90 PID 2320 wrote to memory of 544 2320 services.exe 91 PID 2320 wrote to memory of 544 2320 services.exe 91 PID 2320 wrote to memory of 544 2320 services.exe 91 PID 4820 wrote to memory of 3696 4820 hidde2.exe 93 PID 4820 wrote to memory of 3696 4820 hidde2.exe 93 PID 4820 wrote to memory of 3696 4820 hidde2.exe 93 PID 544 wrote to memory of 5096 544 NET.exe 95 PID 544 wrote to memory of 5096 544 NET.exe 95 PID 544 wrote to memory of 5096 544 NET.exe 95 PID 2992 wrote to memory of 932 2992 hidde1.exe 99 PID 2992 wrote to memory of 932 2992 hidde1.exe 99 PID 2992 wrote to memory of 932 2992 hidde1.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1d2adaabf198d26f9cb17e7afc873387.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1d2adaabf198d26f9cb17e7afc873387.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\PEncrypt4.exe.exe"C:\Users\Admin\AppData\Local\Temp\PEncrypt4.exe.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\hidden12.exe.exe"C:\Users\Admin\AppData\Local\Temp\hidden12.exe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\hide.exe"C:\Windows\hide.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Windows\hidde2.exe"C:\Windows\hidde2.exe"3⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\services.exeC:\Windows\services.exe -XP5⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\NET.exeNET STOP navapsvc6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP navapsvc7⤵
- System Location Discovery: System Language Discovery
PID:5096
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\hidde2.exe.bat4⤵
- System Location Discovery: System Language Discovery
PID:3696
-
-
-
C:\Windows\hide1.exe"C:\Windows\hide1.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:4320
-
-
C:\Windows\hidde1.exe"C:\Windows\hidde1.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\28463\GBKH.exe"C:\Windows\system32\28463\GBKH.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:932
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
5Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
5Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD521bf01b083059e8d8e2e818816f48544
SHA1660c20ce2e003509c55020a3b22de5e54a91bc3b
SHA256f7ba1970c496eaf2c01ce65846c42be2d6d88fcfbcb7a861cf68b80a492b2abd
SHA51291b945e5d957838a9c1f8e958fee19cdf939696af42e4bc742acb735daaaddb5fc984925cc7d5911d9693b6cc5469ebe758e58cfefdfa2c95c83441e08c49d10
-
Filesize
23KB
MD555c85bf992ce16f209a2e1893c2b2ee2
SHA1bf9c0101fcd21d6f16c1dd46f9e1b66568097bb2
SHA256f994de7b640f532a85c816b6414cd34d9460a01d1d134d01c7d9b331387edc8c
SHA5128f3080d2dee92ae1190d6b8024ad7a9f9b18a908b14a44bd13572f902639bda4d2dc0338e46aceabb12b354f6967be81b749483344f6c64f7eaeb2f44d4ae7d6
-
Filesize
2.3MB
MD50a87e3f2a079e2502cec895fb79e3909
SHA14a9de8a3f380c51f4f2bfdca0ba51d98efdbd08b
SHA2567f30df285b5b1d563e1cb9f4ed0d7448ea1761d8a1ee707498da4910876445bd
SHA512333c9149809eb7b2e612cd51bca4b1725d4f3fbabe369a6600cb5360386937a9fc993cecad59a7e32b27ac099e898b28dfde5e363037cca85010336aabf95413
-
Filesize
408KB
MD5ad08929a229e743024d048bec43ffc8a
SHA184389d603539496c25e65d63a2e02ac6d1ef13e4
SHA256e484efa1c7260628341bdce11b54c0efc0faa1d8a55e1f91af5e3b28157f018c
SHA512fd4441396bf5d29dc64ef36f85a7884e9314100bff7e62282b8348c124e0e1eb0c500592d71b9d82d5922dc003fb7d0c4f82200bb39a3d2dfd54d2995f45db02
-
Filesize
542B
MD55c1c8e2d8b9de49d4ec93e0ba64405f6
SHA137a5b0a115f7ddabeffe155b3decd9b121fc1a86
SHA256be0438fb837349cdb2e2db23e59aab669563492ef900a103b5d0921b2886f802
SHA512e8a4089b38d0c8ea2ac32e3e0882d00d0da3b8784b36eeac5076a4fa333d0234dbdad8240455d987d56770b39220359fd405d4e49d58eb4b823cd43d66edf6fe
-
Filesize
8KB
MD505ebf0a4d6b0090a24263545e8ad88e9
SHA16869c5e9e952e635d4d22a26bce2d2e0eb18d6de
SHA2568055524084fc20350f8080ac081b43ae2341ca8ca2cff1d8ca3aec1b703b9194
SHA51297d50716d9342c2518a7bb087512cc25f1929708efde5952f7960c5ea45b9b97037a87b2018c1fca018a06ac10a935c4c060ffc0aa39361793ad6db44a308a53
-
Filesize
5KB
MD5cb3c0cb619462966b5dd1526451d9908
SHA1eda5506554981c9743aeee2d7e45345c8ac883b0
SHA25636caed1a17c7cd4686abb41081b37dd485ece7aeeeee082b6a77f6ba3c82a79e
SHA5122425e3696ac5660dbd35d5be934b0d88dd9dfd671e9e74cb157741f790954031a40b157206c3b8bca4bb7c7f1692669b6cfd6d1165458eff08a63b739b676372
-
Filesize
513KB
MD5530e09cf8bfe1005eb542001320e6928
SHA175b2ceffb570b100a7650f8e264796fa2227c0d7
SHA256a7f8bf4748071dfc2667d4a329b4d6344c4d2994395b49cc59f88cfdd3e9e7af
SHA5128dd5a756ce5aa9a36698a1631ae11ffbe51ff9d5f93a0916c9ba38c2d959a35a6435938693fc07ff25fe8909cd5ab3d82e410b312223d7c56a09f2fc2a12bbde
-
Filesize
36KB
MD5d4a3f90e159ffbcbc4f9740de4b7f171
SHA10542f5d1e2c23dca8d90766b3a8537dc3880e5c9
SHA2562200dd5f83d2fb8c5d3994206a4fa9ff34b4cbfe56ed39a9a03c954cf45d8f77
SHA5125493beb50b5f7d8ec52f32718d01696916ae173456005d0c1294ce695161ce5004aff58ee3892bf5db0f9b23720146a6d3ae8ffbcbbd81f84d894fdc8cf75a94
-
Filesize
24KB
MD543e7d9b875c921ba6be38d45540fb9dd
SHA1f22a73fc0d4aa3ea6c0b8f61d974b028f308acc4
SHA256f1b2b0abe844e6ba812c7f8709a463a7f6c56fa6ac38d376a0739cc3469f795b
SHA5122e74e23c0875b69b82319391c392132f28f4eb45aa412805130382498ae48969a06a2b3a7528b626fa7d7ddb6b006f19f0ef8d73cf73cb9a0c0df44a21077622
-
Filesize
526KB
MD5f4f0f8788778ce33a110b63c3cc3aed5
SHA1e68ed484c9ba6ca3d9e63c02f883f28a9e4c7084
SHA256da9045309568c7c3f7145b6e56d2b54da57acebd260da2cdcb223529e14ee1e5
SHA51284ff49719c627e2902b994b62344232f1ac30219d6cf42d4574d3022f0ec7ceeda366ad4333dfcfb0391c20e8e6c62bbef73946c296acf03ccd7377cc5d30567
-
Filesize
341KB
MD5ee598948065b55dca1fc1450e831b719
SHA17aff17a44140e941dd87221f99d36b128bb6249f
SHA256e06de14bef1baee65fa10753e587365b188704270ad5700d411f7296c814d6c3
SHA512d3a56049c63e6f76bbf4da2cff0fca64f313a9f8946683c56f261ee5e04b085df58290b86b130afe5079fc59e526fd66cd9f0d200d99abfd0a8b1fed132c5767
-
Filesize
83B
MD5c8d6736898dc4a62d4aebe810f82e27a
SHA16274f6d891235f559011473efc352eba493eb3c3
SHA2561558746e97298b6b9a5904aa52d09120b9161414c7ee13da5c4d4a96bf6e5e3c
SHA5126c0c7b09124394e6efa03faf1df2e4099261be088909e018ab32149463bef7fb724abf30f88264ab7c5643183a6ba6fdd85ac0544c99dcc366092997b8ff4871
-
Filesize
182KB
MD5663604b29d5bd47d8fd7e34843438bcf
SHA16900b29ddb35d207e1948880f21f6ef488f52ef5
SHA25615c968cb99c6b9446616b73580233ea588e9177a86c7447ccbe5c2f49a9e457d
SHA512b7efbde4e9ca4e54f482d502687cd6ed09c9b942091a5fdc657bde8f1b9add3eb9b421c38be3ebe1382be4f73869d9b6a255a27649fe2c76d97084c6d52c6527
-
Filesize
1.3MB
MD509ec4a58b417703177292d891502f535
SHA131353621a588c7750e0d4dce5c15b3bcdbd5b82e
SHA256136e9d5edb9ba603714f6e9dc02cb8c49c03e813d5c5f9481bd3d1a4be9c9cd6
SHA512bb9ecbd84023fd729cb595a162365b52f4ca2d441644e6a2ece208455f96ae1d6631d21dd0f9f1efb8bd444d6da75f4c490a87df2d53d5c5405e92a36315cbd8