Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe
-
Size
252KB
-
MD5
ffa745739473d73e9f17da60c65a37c7
-
SHA1
310273de5e45fa57484b227e35f5fe1449a4e6af
-
SHA256
1f0e8a6ccdcbd4755d7544da2037e107349c1d41b4fa4639afb89dd8541b1e09
-
SHA512
cbc9c8ec1ca570fbc9dc83655e9a5cb1552224d2612306811db63a5954227ca782eeaa694b4a860ebdf71e76e7d65b9807173add9ad1dca8cbeae01c9caebb7d
-
SSDEEP
3072:VDOU+qJKjmx5YH6GGFNr/UZ5e8GQZhU8LJV+0L4RHgZy7hMFtGFKivarBoJhDi:VqUPJTFpMZ88GUG8LJV+0k7hg0FKiNJs
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe D:\\VolumeXX" mshta.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" mshta.exe -
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4020 4940 attrib.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3744 4940 attrib.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4728 4940 attrib.exe 93 -
Sets file to hidden 1 TTPs 3 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4020 attrib.exe 3744 attrib.exe 4728 attrib.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation inl9DA9.tmp Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation lieD860.tmp Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 2616 inl9DA9.tmp 3364 lieD860.tmp 2952 kil25F.tmp 3600 lanmam.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File created D:\VolumeXX\desktop.ini mshta.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wbem\fxsst.dll inl9DA9.tmp File created C:\Windows\SysWOW64\wbem\FXSAPI.dll inl9DA9.tmp -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\temp0\gg.exe kil25F.tmp File created C:\Program Files (x86)\LiveMeeting\rarExts32.dat inl9DA9.tmp File created \??\c:\Program Files\lanmam.exe kil25F.tmp File created C:\Program Files\temp0\gg.exe kil25F.tmp -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 536 2952 WerFault.exe 115 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kil25F.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lanmam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lieD860.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inl9DA9.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2936 PING.EXE -
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x0006000000022425-99.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1177238915-1004336348-682003330-500\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://www.4191.com/?hta" mshta.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon mshta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE" mshta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F92DA15-A229-A4D5-B5CE-5280C8B89C19} mshta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F92DA15-A229-A4D5-B5CE-5280C8B89C19}\IsShortCut mshta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F92DA15-A229-A4D5-B5CE-5280C8B89C19}\shell mshta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F92DA15-A229-A4D5-B5CE-5280C8B89C19}\shell\open(&H)\command mshta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node mshta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID mshta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F92DA15-A229-A4D5-B5CE-5280C8B89C19}\shell\open(&H) mshta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F92DA15-A229-A4D5-B5CE-5280C8B89C19}\shell\open(&H)\command\ = "mshta.exe C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\NTUSER~1.HTA" mshta.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2936 PING.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2616 inl9DA9.tmp 2616 inl9DA9.tmp 2952 kil25F.tmp 2952 kil25F.tmp 2952 kil25F.tmp 2952 kil25F.tmp 2952 kil25F.tmp 2952 kil25F.tmp 2616 inl9DA9.tmp 2616 inl9DA9.tmp -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3152 ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2616 inl9DA9.tmp -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3152 wrote to memory of 3224 3152 ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe 82 PID 3152 wrote to memory of 3224 3152 ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe 82 PID 3152 wrote to memory of 3224 3152 ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe 82 PID 3152 wrote to memory of 5056 3152 ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe 84 PID 3152 wrote to memory of 5056 3152 ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe 84 PID 3152 wrote to memory of 5056 3152 ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe 84 PID 3152 wrote to memory of 4996 3152 ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe 86 PID 3152 wrote to memory of 4996 3152 ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe 86 PID 3152 wrote to memory of 4996 3152 ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe 86 PID 5056 wrote to memory of 4592 5056 cmd.exe 87 PID 5056 wrote to memory of 4592 5056 cmd.exe 87 PID 5056 wrote to memory of 4592 5056 cmd.exe 87 PID 3224 wrote to memory of 2616 3224 cmd.exe 89 PID 3224 wrote to memory of 2616 3224 cmd.exe 89 PID 3224 wrote to memory of 2616 3224 cmd.exe 89 PID 2616 wrote to memory of 4632 2616 inl9DA9.tmp 97 PID 2616 wrote to memory of 4632 2616 inl9DA9.tmp 97 PID 2616 wrote to memory of 4632 2616 inl9DA9.tmp 97 PID 4632 wrote to memory of 3364 4632 cmd.exe 99 PID 4632 wrote to memory of 3364 4632 cmd.exe 99 PID 4632 wrote to memory of 3364 4632 cmd.exe 99 PID 3364 wrote to memory of 3640 3364 lieD860.tmp 100 PID 3364 wrote to memory of 3640 3364 lieD860.tmp 100 PID 3364 wrote to memory of 3640 3364 lieD860.tmp 100 PID 3640 wrote to memory of 2936 3640 cmd.exe 102 PID 3640 wrote to memory of 2936 3640 cmd.exe 102 PID 3640 wrote to memory of 2936 3640 cmd.exe 102 PID 3640 wrote to memory of 728 3640 cmd.exe 105 PID 3640 wrote to memory of 728 3640 cmd.exe 105 PID 3640 wrote to memory of 728 3640 cmd.exe 105 PID 2616 wrote to memory of 5056 2616 inl9DA9.tmp 113 PID 2616 wrote to memory of 5056 2616 inl9DA9.tmp 113 PID 2616 wrote to memory of 5056 2616 inl9DA9.tmp 113 PID 5056 wrote to memory of 2952 5056 cmd.exe 115 PID 5056 wrote to memory of 2952 5056 cmd.exe 115 PID 5056 wrote to memory of 2952 5056 cmd.exe 115 PID 2952 wrote to memory of 3600 2952 kil25F.tmp 119 PID 2952 wrote to memory of 3600 2952 kil25F.tmp 119 PID 2952 wrote to memory of 3600 2952 kil25F.tmp 119 PID 2952 wrote to memory of 4088 2952 kil25F.tmp 120 PID 2952 wrote to memory of 4088 2952 kil25F.tmp 120 PID 2952 wrote to memory of 4088 2952 kil25F.tmp 120 PID 2616 wrote to memory of 4628 2616 inl9DA9.tmp 122 PID 2616 wrote to memory of 4628 2616 inl9DA9.tmp 122 PID 2616 wrote to memory of 4628 2616 inl9DA9.tmp 122 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 4020 attrib.exe 3744 attrib.exe 4728 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffa745739473d73e9f17da60c65a37c7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\inl9DA9.tmpC:\Users\Admin\AppData\Local\Temp\inl9DA9.tmp amd-k5p4g.tmp3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_lk_file.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\lieD860.tmpC:\Users\Admin\AppData\Local\Temp\lieD860.tmp5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_rlh_tmp.bat" "6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\PING.EXEping 88.99.00.007⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2936
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Roaming\MICROS~1\NTUSER_LOG.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}7⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
PID:728
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_kl_file.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\kil25F.tmpC:\Users\Admin\AppData\Local\Temp\kil25F.tmp5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 2606⤵
- Program crash
PID:536
-
-
\??\c:\Program Files\lanmam.exe"c:\Program Files\lanmam.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3600
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c afc9fe2f418b00a0.bat6⤵
- System Location Discovery: System Language Discovery
PID:4088
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl9DA9.tmp > nul4⤵
- System Location Discovery: System Language Discovery
PID:4628
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4592
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\FFA745~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4996
-
-
C:\Windows\system32\attrib.exeattrib +s +h "D:\RECYCLERMD4"1⤵
- Process spawned unexpected child process
- Sets file to hidden
- Views/modifies file attributes
PID:4020
-
C:\Windows\system32\attrib.exeattrib +s +h "D:\VolumeXX\desktop.ini"1⤵
- Process spawned unexpected child process
- Sets file to hidden
- Views/modifies file attributes
PID:3744
-
C:\Windows\system32\attrib.exeattrib +s +h "D:\VolumeXX"1⤵
- Process spawned unexpected child process
- Sets file to hidden
- Views/modifies file attributes
PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2952 -ip 29521⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
3Hidden Files and Directories
3Indicator Removal
1File Deletion
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.4MB
MD5cb18658a181d6c9574974729bbdd0431
SHA11d7e6c5a93fe58714ce79d022b7a5cf0a414b8fb
SHA2561f807ae095e9e8580fe486fe57d9f52cb329bd7fdc882ca25d23f45747bdb790
SHA512edc1981fbd89d5c0516c493a6d25f3c0770d539d5862b76739769903729b2892145c398b46d0bb1dc6ef73b19d27107587e87c2ce1df65ba8a497f01414b661c
-
Filesize
2KB
MD51a9f52dccd07d5625b7bdfcab3a3f931
SHA18425b4881efec05150a14515cbb1bb99132e6058
SHA256f1884c631989540f1e88f580d5753aecb98d27e3651aa7115afb1ba36d08da5d
SHA512ba5edc364e0375c73a9370b22a6b8b588a3c4720b60503ae14c4b8bdcded4e15e8a43a517eebeef45857a1536420ef65ee5e7fef70d911ec59aaa11a25c87dea
-
Filesize
765B
MD50adb15b2c15a01ae051e2c0d87549147
SHA1db340a5eb1da94cf11a7699270ce8f455c0f856d
SHA2568ff35d78625cad1d0d5805a8cdb4208a252f4f42a576e1906e41522e6dc85dc8
SHA51206a1f5ab538036c6d601c8144eac123ffa022541310fb0ca01157e4518cba7dff121a68a6ed05df32b3636fc84d9593d00e9808c07432944d17e6b1983379f69
-
Filesize
59B
MD5c9e449044e083088646143ac7f5bb9f8
SHA1358e065d8c096fd7801ccbcdffb069b4a5398539
SHA256cac2aaf7dd83fc9a9df5145be134ab6009b5d0a7f3e00555799b73d593e36f0e
SHA512fa626e80ed64a92f96c2093815b0ba257f1b4f41ebad48e2c03bfdf70917f9e82bf3478f9198f54df7aff4846a4a93f4b175a4fc3d05432792fcfe7289a04371
-
Filesize
44B
MD53aa7a29cad7a6b051d279b321849d362
SHA12f91ac9203056e8571284df4a903b90491dd296b
SHA2569d472d79afd302e2aa2634966937bbc03a064e64c03473a9e6cb8ae972ccf75c
SHA51200a17b0f42d3b3c87b50d3448835d896f09dd31cc7973d5d7939a9650bd596c66229f72e7188229b57be0300ccdf6672354374cee7c77ab9b1eb4034dae976ae
-
Filesize
45B
MD5b92a8433a07c6df70da11f5c98070d2c
SHA146b9f2b6625524bd5215575a9301b82011bffc87
SHA2561118edec964164d13ef313dd7ecd2e6755bb9888a8b26cb018d8accfc1bdd9db
SHA5126545d367ee76cf932d63b769c422eb87b95695a081295b847b91d88e746693f2fd4ac78a464234730dff5614834995d5f18b80d1db1e4fe1bf95e7d36d1e56b1
-
Filesize
70B
MD5edea5cd5060d69b6c558fea75e330a67
SHA1929e7c5ca8c300a98ac6833d0e8fa912ca9fa5dd
SHA2561ed1bc8bfd84479497b2c1e3d0ca1df56eb2f3d82a68862e8b50eead06889b39
SHA512adbe14c811b915972709530049bb6934eacead6c5d19243ecea07abdd6c93aeede3fcae99f6419fb7ca1b2394dcef19e642be36f22c572de01b069dac2b4aa61
-
Filesize
98B
MD58663de6fce9208b795dc913d1a6a3f5b
SHA1882193f208cf012eaf22eeaa4fef3b67e7c67c15
SHA2562909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61
SHA5129381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688
-
Filesize
7KB
MD5ed7e356d003b19e3a5e8f294713c7369
SHA14cb75b0571cf14dc86179e565010fc25ae9d5c91
SHA2566649e07c8f87501a01d62f21a2f2b50aebe30886c8a3d0b86ef34de4f6519f4d
SHA5127bd690e7e8316a03468c1ad834f9b1fdabe0631b34f349f9cb61203ff2f590c202578a4c830dead46302ad61a6122741f1ed8e319e4c792654cfee8afdeba655
-
Filesize
425B
MD5da68bc3b7c3525670a04366bc55629f5
SHA115fda47ecfead7db8f7aee6ca7570138ba7f1b71
SHA25673f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5
SHA5126fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0