Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240729-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
26-09-2024 13:17
Behavioral task
behavioral1
Sample
f873fa69d444a4c32e36c5c228486052_JaffaCakes118
Resource
ubuntu2204-amd64-20240729-en
General
-
Target
f873fa69d444a4c32e36c5c228486052_JaffaCakes118
-
Size
1.2MB
-
MD5
f873fa69d444a4c32e36c5c228486052
-
SHA1
6bb5f8a69d04ea08d43792b2bf8ea5e1f6858ae3
-
SHA256
a8754cac6d8ff294ac4c8b39e6efcb8b05d6e18f12c839ca3e93e98067ae4379
-
SHA512
5bffb43982c9ce8c7ba5d4f174c569b97be04c6c96e406e026158ba31d40b79e1c81074080eee7fecfb7c265152dca68651b8da47e5d0a1ef874a7f990402a41
-
SSDEEP
24576:e845rGHu6gVJKG75oFpA0VWeX4P2y1q2rJp0:745vRVJKGtSA0VWeouu9p0
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
Processes:
resource yara_rule /usr/bin/bsd-port/getty family_mrblack -
File and Directory Permissions Modification 1 TTPs 12 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodshchmodshchmodshchmodshchmodshshchmodpid process 1643 chmod 1650 sh 1659 chmod 1668 sh 1669 chmod 1632 sh 1633 chmod 1642 sh 1651 chmod 1658 sh 1622 sh 1623 chmod -
Executes dropped EXE 2 IoCs
Processes:
getty.sshdioc pid process /usr/bin/bsd-port/getty 1591 getty /usr/bin/.sshd 1614 .sshd -
Processes:
f873fa69d444a4c32e36c5c228486052_JaffaCakes118gettydescription ioc process File opened for modification /etc/init.d/DbSecuritySpt f873fa69d444a4c32e36c5c228486052_JaffaCakes118 File opened for modification /etc/init.d/selinux getty -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
Processes:
f873fa69d444a4c32e36c5c228486052_JaffaCakes118description ioc process File opened for reading /proc/net/route f873fa69d444a4c32e36c5c228486052_JaffaCakes118 -
Write file to user bin folder 11 IoCs
Processes:
f873fa69d444a4c32e36c5c228486052_JaffaCakes118gettycpcpcpcpcpcpcpcpdescription ioc process File opened for modification /usr/bin/bsd-port/udevd.lock f873fa69d444a4c32e36c5c228486052_JaffaCakes118 File opened for modification /usr/bin/bsd-port/getty.lock getty File opened for modification /usr/bin/dpkgd/ss cp File opened for modification /usr/bin/ps cp File opened for modification /usr/bin/bsd-port/getty.lock f873fa69d444a4c32e36c5c228486052_JaffaCakes118 File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/ss cp File opened for modification /usr/bin/bsd-port/getty cp -
Writes file to system bin folder 3 IoCs
Processes:
cpcpcpdescription ioc process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp File opened for modification /bin/ss cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
gettyf873fa69d444a4c32e36c5c228486052_JaffaCakes118description ioc process File opened for reading /proc/cpuinfo getty File opened for reading /proc/cpuinfo f873fa69d444a4c32e36c5c228486052_JaffaCakes118 -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
f873fa69d444a4c32e36c5c228486052_JaffaCakes118gettydescription ioc process File opened for reading /proc/net/dev f873fa69d444a4c32e36c5c228486052_JaffaCakes118 File opened for reading /proc/net/dev getty File opened for reading /proc/net/route f873fa69d444a4c32e36c5c228486052_JaffaCakes118 File opened for reading /proc/net/arp f873fa69d444a4c32e36c5c228486052_JaffaCakes118 -
Processes:
mkdirmkdircpinsmodmkdirmkdircpcpcpf873fa69d444a4c32e36c5c228486052_JaffaCakes118insmodgettymkdircpcpmkdircpmkdirmkdircpmkdirmkdircpmkdirmkdirmkdir.sshdcpmkdirmkdirmkdirmkdircpdescription ioc process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/meminfo f873fa69d444a4c32e36c5c228486052_JaffaCakes118 File opened for reading /proc/cmdline insmod File opened for reading /proc/stat getty File opened for reading /proc/sys/kernel/version f873fa69d444a4c32e36c5c228486052_JaffaCakes118 File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo getty File opened for reading /proc/sys/kernel/version getty File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/sys/kernel/version .sshd File opened for reading /proc/stat f873fa69d444a4c32e36c5c228486052_JaffaCakes118 File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
Processes:
.sshdf873fa69d444a4c32e36c5c228486052_JaffaCakes118description ioc process File opened for modification /tmp/notify.file .sshd File opened for modification /tmp/conf.n f873fa69d444a4c32e36c5c228486052_JaffaCakes118 File opened for modification /tmp/gates.lod .sshd File opened for modification /tmp/moni.lod f873fa69d444a4c32e36c5c228486052_JaffaCakes118 File opened for modification /tmp/bill.lock f873fa69d444a4c32e36c5c228486052_JaffaCakes118 File opened for modification /tmp/gates.lod f873fa69d444a4c32e36c5c228486052_JaffaCakes118 File opened for modification /tmp/notify.file f873fa69d444a4c32e36c5c228486052_JaffaCakes118 File opened for modification /tmp/moni.lod .sshd
Processes
-
/tmp/f873fa69d444a4c32e36c5c228486052_JaffaCakes118/tmp/f873fa69d444a4c32e36c5c228486052_JaffaCakes1181⤵
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1567 -
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"2⤵PID:1573
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt3⤵PID:1574
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"2⤵PID:1575
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt3⤵PID:1576
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"2⤵PID:1577
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt3⤵PID:1578
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"2⤵PID:1579
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt3⤵PID:1580
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"2⤵PID:1581
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt3⤵PID:1582
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1583
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1584
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1585
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1586
-
-
-
/bin/shsh -c "cp -f /tmp/f873fa69d444a4c32e36c5c228486052_JaffaCakes118 /usr/bin/bsd-port/getty"2⤵PID:1587
-
/usr/bin/cpcp -f /tmp/f873fa69d444a4c32e36c5c228486052_JaffaCakes118 /usr/bin/bsd-port/getty3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1588
-
-
-
/bin/shsh -c /usr/bin/bsd-port/getty2⤵PID:1590
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty3⤵
- Executes dropped EXE
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1591 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1599
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1600
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1601
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1602
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1603
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1604
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1605
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1606
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1607
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1608
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1609
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1610
-
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1611
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1615
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1616
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1617
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1618
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1619
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/lsof"4⤵PID:1620
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/lsof5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1621
-
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"4⤵
- File and Directory Permissions Modification
PID:1622 -
/usr/bin/chmodchmod 0755 /bin/lsof5⤵
- File and Directory Permissions Modification
PID:1623
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1624
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1625
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1626
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1627
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1628
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1629
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"4⤵PID:1630
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1631
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵
- File and Directory Permissions Modification
PID:1632 -
/usr/bin/chmodchmod 0755 /bin/ps5⤵
- File and Directory Permissions Modification
PID:1633
-
-
-
/bin/shsh -c "cp -f /bin/ss /usr/bin/dpkgd/ss"4⤵PID:1634
-
/usr/bin/cpcp -f /bin/ss /usr/bin/dpkgd/ss5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1635
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1636
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1637
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1638
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1639
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ss"4⤵PID:1640
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ss5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1641
-
-
-
/bin/shsh -c "chmod 0755 /bin/ss"4⤵
- File and Directory Permissions Modification
PID:1642 -
/usr/bin/chmodchmod 0755 /bin/ss5⤵
- File and Directory Permissions Modification
PID:1643
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1644
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1645
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1646
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1647
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"4⤵PID:1648
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1649
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵
- File and Directory Permissions Modification
PID:1650 -
/usr/bin/chmodchmod 0755 /usr/bin/lsof5⤵
- File and Directory Permissions Modification
PID:1651
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1652
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1653
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1654
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1655
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ps"4⤵PID:1656
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1657
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"4⤵
- File and Directory Permissions Modification
PID:1658 -
/usr/bin/chmodchmod 0755 /usr/bin/ps5⤵
- File and Directory Permissions Modification
PID:1659
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1661
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1663
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1664
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1665
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ss"4⤵PID:1666
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ss5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1667
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ss"4⤵
- File and Directory Permissions Modification
PID:1668 -
/usr/bin/chmodchmod 0755 /usr/bin/ss5⤵
- File and Directory Permissions Modification
PID:1669
-
-
-
/bin/shsh -c "insmod /usr/bin/bsd-port/xpacket.ko"4⤵PID:1672
-
/usr/sbin/insmodinsmod /usr/bin/bsd-port/xpacket.ko5⤵
- Reads runtime system information
PID:1673
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1593
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1594
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1595
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1596
-
-
-
/bin/shsh -c "cp -f /tmp/f873fa69d444a4c32e36c5c228486052_JaffaCakes118 /usr/bin/.sshd"2⤵PID:1597
-
/usr/bin/cpcp -f /tmp/f873fa69d444a4c32e36c5c228486052_JaffaCakes118 /usr/bin/.sshd3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1598
-
-
-
/bin/shsh -c /usr/bin/.sshd2⤵PID:1613
-
/usr/bin/.sshd/usr/bin/.sshd3⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1614
-
-
-
/bin/shsh -c "insmod /tmp/xpacket.ko"2⤵PID:1670
-
/usr/sbin/insmodinsmod /tmp/xpacket.ko3⤵
- Reads runtime system information
PID:1671
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD5d603768851f59ea6b139420f0b33a02a
SHA1e71f9d78a24ab6198fc864602f2b3db58d4b4763
SHA256009b05133e30685905c15e3853adf5d721381670d41483d9fea6cc7babdd3778
SHA51250976ccc85b7a64748bb080236c2387ddff0df52fe289f18102be0760f627284dd67553946eb7a92d253b8ad1ff19521e5990f73738d47ac77ad6d4cc7c5a55a
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
73B
MD57cf6f03d68e1b87a3b816184485ddd05
SHA15914feaa3476fb3a79f1a0cd3afe9c6dcc8f5df2
SHA2564f1cde65ffa54de1e8de1823e8c2752c8c066323bcb1ffebbdf901163fe3ced8
SHA512390535f4d612b73290d5819fac39fc9c345df2c78590589b1879cb250fbb9712ed5a44c805187289cfc20cafc89ddd4ba7334d2c9f73745ff0dda779d8c3a8bc
-
Filesize
4B
MD5dfa92d8f817e5b08fcaafb50d03763cf
SHA1722a7e9c6dcbb04ed1fffe8d658ea03ce68f8e01
SHA256a2258ffaf9a1490a7a7a01c282b1fe03224a2952b119c3f32b1de4739407cd58
SHA5121bb31aa3c0b2b98b36fd84e77aea11ddd9861c3117e90f50627816895636534067f94ea56526c692611289f44d020dc9b44b03d2c94db07f04ae9d2e9b643d77
-
Filesize
4B
MD59a4400501febb2a95e79248486a5f6d3
SHA13fc08852ebb121a140b47072dd019ee0cc842a8e
SHA256fe35907591696b6a53ef1010575751a6ff02c810b26a6738e718fbfab4af0e55
SHA51218571f26c030786374ce211743682be2c0d16c2556a28395ef2eecfbef59a9c709c76a5ae9f9b4d7c407241163e725f970870c621ce765c08f33bec6118c43f4
-
Filesize
51B
MD584dee6df4470dd0e11b56a0c0930f44f
SHA12b85a3a2e3222ea38fbf54c757f57f9af0083521
SHA2568d25558744970e2fdfd57831e7d644b554adcc4b191f71f34efb5378ab319c04
SHA512621b09020cc6acdd15b1725c3c37f17d5d78d71512095ca74041314973f3b10147781c79fa65f511f6936214a8df8b59ed504dab25b7d6efc3849150d9a05738
-
Filesize
1.2MB
MD5f873fa69d444a4c32e36c5c228486052
SHA16bb5f8a69d04ea08d43792b2bf8ea5e1f6858ae3
SHA256a8754cac6d8ff294ac4c8b39e6efcb8b05d6e18f12c839ca3e93e98067ae4379
SHA5125bffb43982c9ce8c7ba5d4f174c569b97be04c6c96e406e026158ba31d40b79e1c81074080eee7fecfb7c265152dca68651b8da47e5d0a1ef874a7f990402a41
-
Filesize
163KB
MD5ab57b66cc531ae0f996963223e632b60
SHA1bf7e5becd33f21c2539f5a75ffa0ab61c49c8795
SHA2562484863a7bfda7f97b90bfd5dfceed4ec9f27dd51f9c5158c8daabbf4309b1df
SHA512908acef13f3c1d80b7169ec3b16bb67006013453348fff75550bc3c6c2137e798b21d7990edbd5be63d756d9c41b06160aebf38aa80547e4bafa3a62596057f6
-
Filesize
138KB
MD58146139c2ad7e550b1d1f49480997446
SHA1074db8890c3227bd8a588417f5b9bde637bcf3af
SHA256207df9d438f75185ab3af2ab1173d104831a6631c28ef40d38b2ab43de27b40f
SHA512b6d71d537f593b9af833e6f798e412e95fc486a313414ed8cca9639f61be7ac9dca700e9f861c0d07c7f65b3783127a67f829f422472cad8938ba01d397ab9de
-
Filesize
125KB
MD51b25ac945efae8520ba112b500e2d561
SHA18324c4d1d1427829266e82f203386232ff82af15
SHA2565eb16d9a8bc81fe767725874e3f67623b8e86b46ec93546be49c5b09d3ab4636
SHA512e191f967170ea4844f736c5ab75b7bf45fef3af34f0a4bef0d36475d646b0b089449fe39806664b9f6ce1984037687930cc368892230662c8c30f67fa3ac216e