Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe
-
Size
110KB
-
MD5
d9d8eac20ee056aef299b2ff04fb5bc1
-
SHA1
7b9d3654e348f6064f6233cc297203c897ca581b
-
SHA256
899fd9291112a2dad595f7fd749b7de5027da5cf1c9bb05e9ea90796d1207d44
-
SHA512
21da9f37af663f04fe5c2bd9e4712b437bfabafa00f8d35e3755921e49a0c8ff7b12b5620eb96f0c1eb4bfc4b56ec99ef84723ec15ba04198a9d83b63a38f274
-
SSDEEP
1536:awSGenMXapWhZ1a8tPRDWAqEaPQ2AEbd4UFtTPL6PRWpvn8rJi8ZylQF:axMXapWhe8tZDWxRzA4/HArvIQF
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1776 Nashy.exe 2396 Nashy.exe -
Loads dropped DLL 5 IoCs
pid Process 1804 d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe 1804 d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe 1776 Nashy.exe 1776 Nashy.exe 2396 Nashy.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Runonce = "C:\\Windows\\system32\\runouce.exe" Nashy.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Nashy.exe File opened (read-only) \??\W: Nashy.exe File opened (read-only) \??\Y: Nashy.exe File opened (read-only) \??\L: Nashy.exe File opened (read-only) \??\P: Nashy.exe File opened (read-only) \??\I: Nashy.exe File opened (read-only) \??\J: Nashy.exe File opened (read-only) \??\K: Nashy.exe File opened (read-only) \??\Q: Nashy.exe File opened (read-only) \??\T: Nashy.exe File opened (read-only) \??\V: Nashy.exe File opened (read-only) \??\E: Nashy.exe File opened (read-only) \??\G: Nashy.exe File opened (read-only) \??\X: Nashy.exe File opened (read-only) \??\O: Nashy.exe File opened (read-only) \??\M: Nashy.exe File opened (read-only) \??\N: Nashy.exe File opened (read-only) \??\U: Nashy.exe File opened (read-only) \??\Z: Nashy.exe File opened (read-only) \??\H: Nashy.exe File opened (read-only) \??\S: Nashy.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\runouce.exe Nashy.exe File opened for modification C:\Windows\SysWOW64\runouce.exe Nashy.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE Nashy.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe Nashy.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe Nashy.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe Nashy.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\NOTEBOOK.HTM Nashy.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\readme.eml Nashy.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_view.html Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsBrowserUpgrade.html Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe Nashy.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe Nashy.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm.html Nashy.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsColorChart.html Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\title.htm Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\about.html Nashy.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\readme.eml Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsViewFrame.html Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\JUDGESCH.HTM Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\readme.eml Nashy.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe Nashy.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\readme.eml Nashy.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Roses.htm Nashy.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Nashy.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsViewTemplate.html Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE Nashy.exe File opened for modification C:\Program Files\Java\jre7\Welcome.html Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Nashy.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OSPP.HTM Nashy.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe Nashy.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\about.html Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe Nashy.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\readme.eml Nashy.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe Nashy.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\DADSHIRT.HTM Nashy.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe Nashy.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsDoNotTrust.html Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\license.html Nashy.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\readme.eml Nashy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\RELEASE-NOTES.html Nashy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsBlankPage.html Nashy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe Nashy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe Nashy.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\license.html Nashy.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nashy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nashy.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2396 Nashy.exe 2396 Nashy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 1776 1804 d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe 30 PID 1804 wrote to memory of 1776 1804 d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe 30 PID 1804 wrote to memory of 1776 1804 d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe 30 PID 1804 wrote to memory of 1776 1804 d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe 30 PID 1804 wrote to memory of 1776 1804 d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe 30 PID 1804 wrote to memory of 1776 1804 d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe 30 PID 1804 wrote to memory of 1776 1804 d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe 30 PID 1776 wrote to memory of 2396 1776 Nashy.exe 31 PID 1776 wrote to memory of 2396 1776 Nashy.exe 31 PID 1776 wrote to memory of 2396 1776 Nashy.exe 31 PID 1776 wrote to memory of 2396 1776 Nashy.exe 31 PID 1776 wrote to memory of 2396 1776 Nashy.exe 31 PID 1776 wrote to memory of 2396 1776 Nashy.exe 31 PID 1776 wrote to memory of 2396 1776 Nashy.exe 31 PID 2396 wrote to memory of 1208 2396 Nashy.exe 21 PID 2396 wrote to memory of 1208 2396 Nashy.exe 21 PID 2396 wrote to memory of 1208 2396 Nashy.exe 21 PID 2396 wrote to memory of 1208 2396 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21 PID 1776 wrote to memory of 1208 1776 Nashy.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nashy.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nashy.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nashy.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nashy.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\readme.eml
Filesize14KB
MD5a137ae9a70eee13ac53e539dd845d2d8
SHA166027d456fc880ac0f744a0c81ed09c56e79eb08
SHA256a01c54039514ba87a1573dee1a4d53b9c665cd64fdfb30fb5009f12288aa9ec4
SHA5123328c82896365dfbdd325475b9ae58b6c7e8109e3d54a555c343948aafdba2fda19403b25eea5d504fe881ebeb20304fc3bb075fddb5a9f577af7da86d34a083
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize12KB
MD58156706568e77846b7bfbcc091c6ffeb
SHA1792aa0db64f517520ee8f745bee71152532fe4d2
SHA2565e19cfbd6690649d3349e585472385186d99f56a94dc32d9073b83011cea85f8
SHA5128760f26069296f0fe09532f1244d93a57db4cafa8d06aaa9dc981bcaed4bde05366ef21e6f0c1aadad4478382b59a4e43d26c04185cf2ed965901321d05604b8
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize8KB
MD57757fe48a0974cb625e89012c92cc995
SHA1e4684021f14053c3f9526070dc687ff125251162
SHA256c0a8aa811a50c9b592c8f7987c016e178c732d7ebfd11aa985a8f0480539fa03
SHA512b3d4838b59f525078542e7ebbf77300d6f94e13b0bff1c9a2c5b44a66b89310a2593815703f9571565c18b0cdeb84e9e48432208aaa25dff9d2223722902d526
-
Filesize
451KB
MD527df88537ca59892dbaf84f87bf4460e
SHA16e22e50ec5ca859a90a0c19707758700a23f3ce4
SHA2561a00663d12aa3b4bf04cfc184f2c1d6e6a143f28057399e2061900fcfc5f5de0
SHA5122ab86fcf8239244c50e307ee4f3f9af246d364fdf68f74cea98b8dd3efe6c562cd98d189b7739a6b692c325125c7ef35b5756c6d3a137ee7d03bba933a2c81a1
-
Filesize
640KB
MD57d5c0e8eff02c4762ec2750c012672fb
SHA16349354ae68dd39440d9fdd83e597f9c70059b9c
SHA2564fbae47827d6865813730195b9639084316603313c289e257d9120d06672b51a
SHA512321b4a28da6bb6f4f7adc35c8c6f98d22f93f40e0f75ba2fa44dc223c609599af7769c7aab3f41eb02f97289a75ae3ea61f307171975f12833f8fb0eb5945750
-
Filesize
640KB
MD551e7de47bf474ae9c54f486bfb0fb0cb
SHA13f24cf09c99250f52aefdc22eb82716d0f0231f5
SHA2563c30ac5466cf4b2ac90e8a7c9d36a941773bc02aafb0ee0af9a255cfcc7d10bc
SHA512af6077e7dc9baf4e7a28a48699a92a92ac717f9fc22a2681ab2554c12467d6dd3df584f708298b0226460b83c54368d265d245a98891d4b926c99c27afed88ff
-
Filesize
461KB
MD5fd18b53d225ad1b0f2d922f3787aea7e
SHA1167c7e296a232394fd427bff45df6b3199a76c48
SHA256770ffca6ade670988c29618cb20f1b0b6d0f7cc22a91899493b415c9b4b53932
SHA512cf013402f9cc08f9a66b1a71656eae5b57d1127cf51cf0b2d0d4f420c0b7fe43f09db916e0a275cc6cf954b0d4da18dad194898e6c18451ef4607a4d20aaa163
-
Filesize
451KB
MD50554cc54144b8fb7f6cae63bbaba3795
SHA16409865254353d12a60a7a170efb09646c4b5f6a
SHA2566a3d4f3224a804a1c0303f51efae3f108b99f490c4068a9fe045658e330f8fff
SHA5128754e7a3b2b4d2e2f20fb721d4602a57bac39102cf25975fe68324c2cbd3b178addbb8c91c99cbff7064e40535c900ea19148121c806ce7db06a8f19e8518b0b
-
Filesize
461KB
MD542bdde3f131396ff83b3aaa7c5e546d6
SHA183bb4793d7111737ae52db7fa4f47d67806141a5
SHA256b5beaaad877321ce4a6d520fc8026ab689bc7dd5a364fee7efb873d68d5f7189
SHA5125e002207f5eaa15a45adee6bac3487c3b9241af4045f8b60aba99b60e9bd53b590a83ea29d9a0dee0734020849bb85dc4fc8b824a799864b5ce155655db124a9
-
Filesize
152KB
MD512feb32986631f3608a71bd3a8773be8
SHA13ad6e089135989cebfc5421b6452443e56fba845
SHA256d9e9cad1e75a56ba5b98e56a96de7be77a3bd4de8248f6220b8b6edfdd6969dd
SHA51294a42a3c8fc4d07d98fa0a980531016c3e0c44edd6c4b933787155c350222495a2631e542882306dfef8c07d8d6e87db20be3d141c0f3afbacbe48232beb06ba
-
Filesize
10KB
MD5257e41fc670256b6c422d0dbf50e9673
SHA1d17fc0252793dec5842093b50e0f663e9d6d3425
SHA2561105cac66abb4e9356ee426a67f40324e534160135264d043253b59e6b082708
SHA5127942403a79f465fa286714cd4e1a29403f3cd23d9edbae6f2fcc8a20d877c7c72d092aa79f4d7b01106a93d76932d4f6ea61dab719b79a4ba92166233191c433
-
Filesize
80KB
MD597842bf77b157c204005834ee6a4a151
SHA129d3e64b4a8fda7ff2d6c42704ed921402bc8d2d
SHA256f58376441b4403f86dcda7bed491c9ab0c11b108bec83d02e877153b0c4e5d26
SHA5128b20ef94e463cc49aa671bc7fb120e092eac94c871eda805239795fa3025cc59f00ce75d357453828845bf65965d7a2168e3aa9f39adc1b62dfc6155696f8c84
-
Filesize
45KB
MD5a8d5395595b37908a079df232c8a4e21
SHA171ee2211d1f45833f67a9344afc121208bc0eace
SHA256078a9f9fcaa7a979575dfc8be7f2325715e2ab219a006035a4cded612d67af25
SHA512829bc8c51c5d206831e1247f849698d547fcea5de8e3576eebdfa4c70b46f6992c7093fae1af19876b5a9dff4abb77dd31354e2c2648fd64ff5df754903f5328