Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/02/2025, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe
-
Size
3.0MB
-
MD5
b78e98368bf87ce58b2aae9a26e1ac3e
-
SHA1
67a746bed23cb4fc97d8f2a542b78bf1ef3a539f
-
SHA256
2eb3ac2d64ce7ccf86f15f751093f6a3d2b9b83d637acba8d95c45ea47cc97dc
-
SHA512
e4249cd918a82a01896f31f7fb1958ce5539d5466e46cf21f7ad29d95b5de23e04d5f517f417fbc03ae8acbc0d5a8b7c0bfa9c1a19996fb569bfe52e8e12b7bf
-
SSDEEP
49152:0Dm5cit6FHMoDUM5n62s1JHy48m3KCnCc7NieDm5cit6FHMoDUM5n62s1J:
Malware Config
Extracted
darkcomet
Guest16
rattcody.zapto.org:20111
codylegge.zapto.org:20111
codylegge.zapto.org:1064
codylegge.zapto.org:1604
192.168.2.11:20111
142.162.41.160:20111
127.0.0.1:20111
DC_MUTEX-GK1MTGJ
-
gencode
6wlfzgB-CUtT
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\drivers\\wathehell.exe" Test.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\drivers\\wathehell.exe,C:\\Windows\\system32\\drivers\\wathehell.exe" wathehell.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile AccSteal.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" AccSteal.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" AccSteal.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" AccSteal.exe -
Windows security bypass 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" AccSteal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" AccSteal.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" AccSteal.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts AccSteal.exe File created C:\Windows\SysWOW64\drivers\wathehell.exe Test.exe File opened for modification C:\Windows\SysWOW64\drivers\wathehell.exe Test.exe File opened for modification C:\Windows\SysWOW64\drivers\ Test.exe File created C:\Windows\SysWOW64\drivers\wathehell.exe wathehell.exe File opened for modification C:\Windows\SysWOW64\drivers\wathehell.exe wathehell.exe File opened for modification C:\Windows\SysWOW64\drivers\ wathehell.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2816 attrib.exe 2788 attrib.exe -
Executes dropped EXE 8 IoCs
pid Process 2004 PvpLogger.exe 1792 AccSteal.exe 2704 Minecraft cracked.exe 2740 Test.exe 2732 Minecraft Beta Cracked.exe 2156 Neptune.exe 2948 wathehell.exe 1660 iexplorer.exe -
Loads dropped DLL 7 IoCs
pid Process 2740 Test.exe 2740 Test.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" AccSteal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" AccSteal.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\drivers\\wathehell.exe" Test.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\drivers\\wathehell.exe" wathehell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\iexplorer.exe" iexplorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2100 2948 WerFault.exe 42 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PvpLogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AccSteal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wathehell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1792 AccSteal.exe Token: SeSecurityPrivilege 1792 AccSteal.exe Token: SeTakeOwnershipPrivilege 1792 AccSteal.exe Token: SeLoadDriverPrivilege 1792 AccSteal.exe Token: SeSystemProfilePrivilege 1792 AccSteal.exe Token: SeSystemtimePrivilege 1792 AccSteal.exe Token: SeProfSingleProcessPrivilege 1792 AccSteal.exe Token: SeIncBasePriorityPrivilege 1792 AccSteal.exe Token: SeCreatePagefilePrivilege 1792 AccSteal.exe Token: SeBackupPrivilege 1792 AccSteal.exe Token: SeRestorePrivilege 1792 AccSteal.exe Token: SeShutdownPrivilege 1792 AccSteal.exe Token: SeDebugPrivilege 1792 AccSteal.exe Token: SeSystemEnvironmentPrivilege 1792 AccSteal.exe Token: SeChangeNotifyPrivilege 1792 AccSteal.exe Token: SeRemoteShutdownPrivilege 1792 AccSteal.exe Token: SeUndockPrivilege 1792 AccSteal.exe Token: SeManageVolumePrivilege 1792 AccSteal.exe Token: SeImpersonatePrivilege 1792 AccSteal.exe Token: SeCreateGlobalPrivilege 1792 AccSteal.exe Token: 33 1792 AccSteal.exe Token: 34 1792 AccSteal.exe Token: 35 1792 AccSteal.exe Token: SeIncreaseQuotaPrivilege 2740 Test.exe Token: SeSecurityPrivilege 2740 Test.exe Token: SeTakeOwnershipPrivilege 2740 Test.exe Token: SeLoadDriverPrivilege 2740 Test.exe Token: SeSystemProfilePrivilege 2740 Test.exe Token: SeSystemtimePrivilege 2740 Test.exe Token: SeProfSingleProcessPrivilege 2740 Test.exe Token: SeIncBasePriorityPrivilege 2740 Test.exe Token: SeCreatePagefilePrivilege 2740 Test.exe Token: SeBackupPrivilege 2740 Test.exe Token: SeRestorePrivilege 2740 Test.exe Token: SeShutdownPrivilege 2740 Test.exe Token: SeDebugPrivilege 2740 Test.exe Token: SeSystemEnvironmentPrivilege 2740 Test.exe Token: SeChangeNotifyPrivilege 2740 Test.exe Token: SeRemoteShutdownPrivilege 2740 Test.exe Token: SeUndockPrivilege 2740 Test.exe Token: SeManageVolumePrivilege 2740 Test.exe Token: SeImpersonatePrivilege 2740 Test.exe Token: SeCreateGlobalPrivilege 2740 Test.exe Token: 33 2740 Test.exe Token: 34 2740 Test.exe Token: 35 2740 Test.exe Token: SeIncreaseQuotaPrivilege 2948 wathehell.exe Token: SeSecurityPrivilege 2948 wathehell.exe Token: SeTakeOwnershipPrivilege 2948 wathehell.exe Token: SeLoadDriverPrivilege 2948 wathehell.exe Token: SeSystemProfilePrivilege 2948 wathehell.exe Token: SeSystemtimePrivilege 2948 wathehell.exe Token: SeProfSingleProcessPrivilege 2948 wathehell.exe Token: SeIncBasePriorityPrivilege 2948 wathehell.exe Token: SeCreatePagefilePrivilege 2948 wathehell.exe Token: SeBackupPrivilege 2948 wathehell.exe Token: SeRestorePrivilege 2948 wathehell.exe Token: SeShutdownPrivilege 2948 wathehell.exe Token: SeDebugPrivilege 2948 wathehell.exe Token: SeSystemEnvironmentPrivilege 2948 wathehell.exe Token: SeChangeNotifyPrivilege 2948 wathehell.exe Token: SeRemoteShutdownPrivilege 2948 wathehell.exe Token: SeUndockPrivilege 2948 wathehell.exe Token: SeManageVolumePrivilege 2948 wathehell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1660 iexplorer.exe 1792 AccSteal.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 768 wrote to memory of 2004 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 30 PID 768 wrote to memory of 2004 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 30 PID 768 wrote to memory of 2004 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 30 PID 768 wrote to memory of 2004 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 30 PID 768 wrote to memory of 1792 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 31 PID 768 wrote to memory of 1792 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 31 PID 768 wrote to memory of 1792 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 31 PID 768 wrote to memory of 1792 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 31 PID 768 wrote to memory of 2704 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 32 PID 768 wrote to memory of 2704 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 32 PID 768 wrote to memory of 2704 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 32 PID 768 wrote to memory of 2740 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 33 PID 768 wrote to memory of 2740 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 33 PID 768 wrote to memory of 2740 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 33 PID 768 wrote to memory of 2740 768 JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe 33 PID 2740 wrote to memory of 2892 2740 Test.exe 34 PID 2740 wrote to memory of 2892 2740 Test.exe 34 PID 2740 wrote to memory of 2892 2740 Test.exe 34 PID 2740 wrote to memory of 2892 2740 Test.exe 34 PID 2740 wrote to memory of 2688 2740 Test.exe 35 PID 2740 wrote to memory of 2688 2740 Test.exe 35 PID 2740 wrote to memory of 2688 2740 Test.exe 35 PID 2740 wrote to memory of 2688 2740 Test.exe 35 PID 2704 wrote to memory of 2732 2704 Minecraft cracked.exe 36 PID 2704 wrote to memory of 2732 2704 Minecraft cracked.exe 36 PID 2704 wrote to memory of 2732 2704 Minecraft cracked.exe 36 PID 2704 wrote to memory of 2156 2704 Minecraft cracked.exe 39 PID 2704 wrote to memory of 2156 2704 Minecraft cracked.exe 39 PID 2704 wrote to memory of 2156 2704 Minecraft cracked.exe 39 PID 2892 wrote to memory of 2788 2892 cmd.exe 40 PID 2892 wrote to memory of 2788 2892 cmd.exe 40 PID 2892 wrote to memory of 2788 2892 cmd.exe 40 PID 2892 wrote to memory of 2788 2892 cmd.exe 40 PID 2688 wrote to memory of 2816 2688 cmd.exe 41 PID 2688 wrote to memory of 2816 2688 cmd.exe 41 PID 2688 wrote to memory of 2816 2688 cmd.exe 41 PID 2688 wrote to memory of 2816 2688 cmd.exe 41 PID 2740 wrote to memory of 2948 2740 Test.exe 42 PID 2740 wrote to memory of 2948 2740 Test.exe 42 PID 2740 wrote to memory of 2948 2740 Test.exe 42 PID 2740 wrote to memory of 2948 2740 Test.exe 42 PID 2156 wrote to memory of 1660 2156 Neptune.exe 43 PID 2156 wrote to memory of 1660 2156 Neptune.exe 43 PID 2156 wrote to memory of 1660 2156 Neptune.exe 43 PID 2948 wrote to memory of 2140 2948 wathehell.exe 44 PID 2948 wrote to memory of 2140 2948 wathehell.exe 44 PID 2948 wrote to memory of 2140 2948 wathehell.exe 44 PID 2948 wrote to memory of 2140 2948 wathehell.exe 44 PID 2948 wrote to memory of 2100 2948 wathehell.exe 46 PID 2948 wrote to memory of 2100 2948 wathehell.exe 46 PID 2948 wrote to memory of 2100 2948 wathehell.exe 46 PID 2948 wrote to memory of 2100 2948 wathehell.exe 46 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern AccSteal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" AccSteal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion AccSteal.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2788 attrib.exe 2816 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\PvpLogger.exe"C:\Users\Admin\AppData\Local\Temp\PvpLogger.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\AccSteal.exe"C:\Users\Admin\AppData\Local\Temp\AccSteal.exe"2⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\Minecraft cracked.exe"C:\Users\Admin\AppData\Local\Temp\Minecraft cracked.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Minecraft Beta Cracked.exe"C:\Users\Admin\AppData\Local\Temp\Minecraft Beta Cracked.exe"3⤵
- Executes dropped EXE
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\Neptune.exe"C:\Users\Admin\AppData\Local\Temp\Neptune.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Roaming\iexplorer.exe"C:\Users\Admin\AppData\Roaming\iexplorer.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1660
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Test.exe"C:\Users\Admin\AppData\Local\Temp\Test.exe"2⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2816
-
-
-
C:\Windows\SysWOW64\drivers\wathehell.exe"C:\Windows\system32\drivers\wathehell.exe"3⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 5684⤵
- Loads dropped DLL
- Program crash
PID:2100
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD5d916d7795add080820d7e87ea8b261e2
SHA15fed290a2498a8e669cd51f2e03236fad5764677
SHA2568c82ed13d96fa7a79c95d379bafd0a8b2591104ff56c177234fc51383a45bd54
SHA512d269fa7d8a2003810dd860561e68165af42fbf6f30e5a6c3e85445b61beb81925158f662100eaebdabf4b9102b9cf1bf0cfaec0e43e3812b5b848e665b963805
-
Filesize
264KB
MD5775be9fc70f3d88be71fdb6b2aa13ce3
SHA15137cef635dedeb1ab9c3bc9a96a13834ebf11a8
SHA256bfb73b766f4089bc2574b77e20301098b555b5615c1a05f4063beb2b38d9d0e5
SHA5120819da75d5d7ff5eb7c674b08c92aa15723e4c7de70e2a1d616bfca5e65a6f7efb8a71689280a6f37ef2711f29e90d3743225ea76bab68107787eaf1010c0ebc
-
Filesize
420KB
MD52a0a7183c2549249cf70ff0b5335dac5
SHA1681ea72f2cbe7e987a5ac4fa9e78f1300a8c8092
SHA256387042278c3bd7a28bbf04d99107add76be4502d41f2fc78b5d83796f06ac9ba
SHA5120c82c7985562d0b76d42b5d392c71207ccf0b960a61225cdb815795e17f03b8827d17bfcc6d83e785eee1fa913efdd541e1bcddeb513c1663a10ac12c1dcf7ac
-
Filesize
37KB
MD5db278eb42172e3b2c7d711e3c8e3185e
SHA19334855b513276e518f4c678f03e7c2eeef1d59c
SHA256d1e86771c8327c88a3900b0b96bb018c2826591279daa0dbe000d52401990477
SHA512b7b7f3d35d16a4b15a096fbbcec48f024a8f7abe0890d28f8eb1ac4ab742f413566540dd32dfc2680428c63e1c73f00427a28ca4cc04e978eb782837f0cf67ae
-
Filesize
340KB
MD598f9120cda137603e3d3e0d1f693b981
SHA1fbb58808f924656915018d22dd370cf997baa41e
SHA2562c19eb0b2a26c954f4495fd9ffbc69679bf516f6df5da2adb6d37695cc8d5f8a
SHA5125449b79efe72746fd3833f2a5b082a372615757cc9ae4205002056554188a6d952577982305878d9c3aafab270020c2b34bfd43d86daae76f0c9db7f70182d47
-
Filesize
821KB
MD507ba64de2e604a68edf7f5b509b2917d
SHA18f06d8887a53af5946ab9f3a5098a909d800aa01
SHA256670528979c35d038809f30e04a4accb9999431721fa674f3834504d1bc29d2d2
SHA51276afdf1677199e525b21ce9906cf2923bf57b3fb5e6ed4addb0014b63994ed80e48c93cf10a2d0e689f55007f9e2f93dd64d6b502cd9190d61185079ca116f1c
-
Filesize
59B
MD5757345e3b6e815a4393257a58d767f13
SHA10e9b0cd4d0e0472ca222f9a07f0ade2b09552f59
SHA256a8f5b48fdc006e90d5442419c6bbb53e9087b33131edb7c41d93e216bcf444c4
SHA5127dba092736a2e9392a571e54003127398e81a51f3e8d8fe846382e236d5bd3390dc8e441aed040007bf8742c9355f82b3d8072e9b0dfe4f3f50801fbd87b7509
-
Filesize
50B
MD5b774ae3fb1da087e1f83b4f7b2060e5a
SHA197eb9be49ac3af9c851c9e1e84e32bfd53e325a8
SHA256adaf4a84b41e410b02e261cfd0fe7739d98647eab73c3badd32ac6e39f26351b
SHA512f75d0f95f7306d26a12b414bfe37b97fbd37546cb3c6e403def7077329ddffb4b45d5c5f0ba0e7bb6d72851d2d691b0a85267beead42f7cbf2e8c3d45a3b4701
-
Filesize
58B
MD59e15745f4ec21d0c4769ab76904533c9
SHA14b9e4ee53e7e5ff8e199bdf160822525ab848384
SHA256228e99fc1a1db4754f9aff092de05b58bf5b692dbd00b27fa41590dc63f683c5
SHA512fca7d72c03a846c4553f6d6e3d6572badc17101f345c05fb793f4fdd61cfdc9fa74843c6e99cd9b8bcc90449c8c6f6fcf2c8a9babad733ab6b741b1334e104d3