Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 19:08
Behavioral task
behavioral1
Sample
b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe
-
Size
483KB
-
MD5
b8ca3b185e0221af2b3963b1e0aa9a55
-
SHA1
7ab65efceb9265434ec8f5911744ceee4ee8506f
-
SHA256
3f2f807909bd394fdd62a8610cba8ea933cdcdcfc4d1692d506dc52805b0790e
-
SHA512
232d7695fa9cbe28428bd6b36de17640e6771025d75114c01ea8026690fa699898dba9d35da75dd2dd6f026983d3937b8869af5aea1ae714470113eb4c46ab4a
-
SSDEEP
6144:k9I5c/572jwhhwVgS0YYljRKSVAQSeTrJQOcsPWWqXMsZ1RdHnW++Pgq7GqeceA5:jc/5721VghlVP1TlQEW5XvzjJqec5BzH
Malware Config
Signatures
-
Detect Neshta payload 3 IoCs
resource yara_rule behavioral1/files/0x0001000000010315-11.dat family_neshta behavioral1/memory/1824-209-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1824-213-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
pid Process 2804 b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 1824 b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe 1824 b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0008000000016d2a-2.dat upx behavioral1/memory/2804-12-0x0000000000400000-0x000000000050E000-memory.dmp upx behavioral1/memory/2804-208-0x0000000000400000-0x000000000050E000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2804 b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe 2804 b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2804 1824 b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe 30 PID 1824 wrote to memory of 2804 1824 b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe 30 PID 1824 wrote to memory of 2804 1824 b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe 30 PID 1824 wrote to memory of 2804 1824 b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe 30 PID 1824 wrote to memory of 2804 1824 b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe 30 PID 1824 wrote to memory of 2804 1824 b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe 30 PID 1824 wrote to memory of 2804 1824 b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\b8ca3b185e0221af2b3963b1e0aa9a55_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
2KB
MD51633a849b3259c9f3bf42a61c7dc4aad
SHA1563284abaa9a4766b0386d84953a8025a710e706
SHA2568801d8472baeba473bdfbddc07a681399641744e0096f5738178016de9f2b699
SHA51252eef17ae9b4c9f6dc7a42eb4e18762ba275b903d97291ddad367b5d3040ed831d760f21162fae7b262e9754af2c2a112facf6563f0f3074a2e64d3c65ee6f5b
-
Filesize
354B
MD502e0568b3ec869192fd02ac1c8dceb01
SHA134fbcfeff36bf67480d002422d045da318b1b066
SHA256ad868e38e0a3652e9ade55414240ee10a5b611be43e813b5e5c3a8a7267184ee
SHA51212d8853c3a0ed8619a1c142c4f47fc80e84dce85ceed757c024d7a05999aaa6b6e199f595a956e9c06b68d4a66f55d68b216c0110ca41906062d040f566a4776
-
Filesize
1KB
MD5af79093f546c33df9c7d611b1679b204
SHA1b20cd1e4305ecf062c600744a69354378b2d5b0c
SHA256d7d33460bf7ba5d80af40e9d7436fa9fd1f270fdbce7246dfb1af5e74c52a8c0
SHA512c93c6551d103a0e466247318df6dc01e56096f61a07c865c928a6c622923b279ec358481daf54a98c4a2aeb1c9675831cc68b3b284b9503c6a950ddf41837191
-
Filesize
1KB
MD5a3a8fc73c463d664e974deb785879a54
SHA19921ac8f3ad125419875c53dff60b72bb461d8a6
SHA256e9c48318d514b58c2ac8cf9005806579e87313e47d521823c15dcd389247ac80
SHA51228ec81c6b47c11dda34667e2b3c68d509c28977a5adff1d97423638be2d3b1192d09ee193ce7f71f41986312b4f5f0fc31ce1fe5e6c5fd1d9237d756e99308fe
-
Filesize
8KB
MD5a27ffbba261e7d202bc595db4ef02a24
SHA183be172e78b7c4cf303b7bd3bccfbf2fc0330029
SHA2566a5626abfd30faa68956f7b0af4bf0c8977adbc9b5f69217b19421cd9fc1f68e
SHA5121bd82e41755608dfede0077ba1c053afaaec2152030da0d5aa4f4879d4d15f89d6fd3f4522aee522b2dab18a65d9b80ae7e9c870adeeef7b279b293172297b09
-
Filesize
419B
MD5bf09337ebdd68763060cbd7b5e934fda
SHA114cd064c97c60da895c1b08569dc7961fc5320b5
SHA256b27be16124eac99a97922357fdac1aef7d1efb339a223946dcf50a1b0fd9913e
SHA512dd11a82b4a18d3111c85f7829020dd5e37f3935f8c2142992557187a98ca1aec58ad572382b386fee16604a32aa57a607361a7775bcf07e08a03324c2d9c9c00
-
Filesize
4KB
MD58279be72a28bcf097489e57b58df98e9
SHA18a1c9c47449c8291ce4ec6c27e19598c75ed3ed7
SHA256505219690ce590ec4fafe19ed4a4a1eb453be5d6d236ab5210b0a260b768420e
SHA5120cea0b6f5b2ff6ade1260a68b97532842cd5f6867e04083f70c25e38aa5a26309996d54a4a057d9805dec3aef07484efcd1ef869c6631d48f4c6859d89143e0f
-
Filesize
8KB
MD5d741c1ae58697a7b931f86c44f0add9b
SHA141c7a22a3bef3f75b29fcbd86f5c4793bdd43e70
SHA2562dab75dfae14d9bdec1b1457b8fb5949189f0784bcd5f56ced0db87b803886ab
SHA512d581235ba3d018df8d70ee100a2ec3228dffb95f936140c4a552530a0bb5955173fc9a8ea275013415b7cc84154bc2b367c10a3e6718dc26f7ed5cc7f59b5062
-
Filesize
982B
MD514b92cbe22ef5a31a5533d0ab114537e
SHA1e428f1b0236f7a85faf045237a7cd29a305d936c
SHA256a2226e2f7dd1ea319e49b1ff1d277a44b35a314ea6d32be1832e71ddebcc18ba
SHA512b585c5852960d89726d97ddb8e757abe0d36bfb2b5c91a30885e299728d836a048c7a3c5b5e85fbd514e2217d547330d816de497f38204578d333654c8d19f6c
-
Filesize
153B
MD580223145f64ca1caf3d884dfac4301e8
SHA1155399ce252ef81f06351bb2adf44c21f1f37037
SHA256c388b032baee6032d1a76093c51c5eda840d0116da48336401b78a61297e64a7
SHA512285bf4b5c42971e150eae995479994bf7cccac8b2c7b8f5458ba2cb6b4e2cb4816b5be24c511d41bccca0944cebb931fd31d8bcccba33a503259ef127e90359a
-
Filesize
331B
MD5db095e8b1e60adee3f06435486e35d37
SHA1da83976c1ad827de006a0febefa12a164e4bc03c
SHA256e18c192348d1ee923d1d3d25740d8972abddb2316708456320df78b7001c1df5
SHA512985b010c5dfd4c9a7de2cbb95803a36117b647c12e69a9582b46b0394343994f65f38d3d82ffb5e4c4f723f7fcf9b05e9936e33f9a053be36e86605beca51466
-
Filesize
985B
MD505e22e0225f53b69a44b443540c20324
SHA1af5eb7ebf4f053b17d19a678ec84c329e632b2df
SHA256139ff055cec5379c1b58b9b1eb1f205890c5464f58f86eee80f9bc938857705a
SHA5121c754458da075e504f3463cb72d683b8affa553a39083a2565ebe2e664ebf3400546bc687e0058097d256f86f0cc538439178ad8ee0c91abaa745c1bf977dbc5
-
Filesize
2KB
MD5cc19d50e4929c2f34469ac0048d61ef7
SHA12018d01bbc54da234108a48eecb2a44aec65e1b4
SHA2569a30ef045db96855ecd50ab0bbc33d7bc0e6ac496df0416163fa9112ca23567b
SHA51275c2867c5850c556b19cfd06fea8e3f8ec126a95315757ef0349b0f930f83c1b80aef71135f94a7e881c300cf224363829e9dba40aaad617ab94455ad92b3e97
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
443KB
MD568efcc574eecf1f28bb4760eaae588d0
SHA1af5e063cd7c33a9aabca8d82ce943226c569b8cb
SHA256f5f606d7cd434172abadb840fb6af63f682205dd3eaece20cb41dfb2724fc640
SHA5121fe4a9a57c9a54fa41f0c0b78ea5812ead2604409cfe3e542e31f895b31cf37ea9989dddc45a5e84a6fff1248dbdbc636bd652294ad6b5877699cabdec6cce09