Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe
-
Size
235KB
-
MD5
5d02893481bbd7a7cf0be949532e45bb
-
SHA1
d68e6e40e484a5688195ab3bb90a1050806ce37f
-
SHA256
d9a2a4eae9292fc6782abf67b158706bee53503370c46751f21d62b3694054e5
-
SHA512
7de51392e20056b12afdda240234fe23eb8e12bc1ddf441ff0fcba51a4de21b64e425f6153705b5f93c270f077f8d01b39446fa479cafdff8556c9917fc17a75
-
SSDEEP
6144:jyH7xOc6H5c6HcT66vlmrASraT1D8rgzPDkAVHSyH7xOc6H5c6HcT66vlmqAjUei:jazT1LMxa0Ieni
Malware Config
Signatures
-
Detect Neshta payload 6 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000016d4f-12.dat family_neshta behavioral1/memory/2320-122-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2320-125-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x000700000001033a-128.dat family_neshta behavioral1/files/0x0001000000010312-136.dat family_neshta behavioral1/files/0x0001000000010314-143.dat family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 6 IoCs
Processes:
svchost.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exesvchost.exesvchost.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exepid Process 2484 svchost.exe 2320 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 2760 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 1712 svchost.exe 2844 svchost.exe 2848 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Loads dropped DLL 7 IoCs
Processes:
svchost.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exesvchost.exepid Process 2484 svchost.exe 2484 svchost.exe 2320 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 2320 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 1712 svchost.exe 1712 svchost.exe 2320 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exedescription ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
Processes:
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exedescription ioc Process File created C:\Windows\svchost.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File opened for modification C:\Windows\svchost.com 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe File created C:\Windows\svchost.exe 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.exesvchost.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exesvchost.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Modifies registry class 1 IoCs
Processes:
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exepid Process 2848 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exesvchost.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exesvchost.exedescription pid Process procid_target PID 1708 wrote to memory of 2484 1708 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 31 PID 1708 wrote to memory of 2484 1708 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 31 PID 1708 wrote to memory of 2484 1708 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 31 PID 1708 wrote to memory of 2484 1708 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 31 PID 2484 wrote to memory of 2320 2484 svchost.exe 32 PID 2484 wrote to memory of 2320 2484 svchost.exe 32 PID 2484 wrote to memory of 2320 2484 svchost.exe 32 PID 2484 wrote to memory of 2320 2484 svchost.exe 32 PID 2320 wrote to memory of 2760 2320 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 33 PID 2320 wrote to memory of 2760 2320 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 33 PID 2320 wrote to memory of 2760 2320 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 33 PID 2320 wrote to memory of 2760 2320 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 33 PID 2760 wrote to memory of 1712 2760 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 34 PID 2760 wrote to memory of 1712 2760 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 34 PID 2760 wrote to memory of 1712 2760 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 34 PID 2760 wrote to memory of 1712 2760 5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe 34 PID 1712 wrote to memory of 2848 1712 svchost.exe 36 PID 1712 wrote to memory of 2848 1712 svchost.exe 36 PID 1712 wrote to memory of 2848 1712 svchost.exe 36 PID 1712 wrote to memory of 2848 1712 svchost.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\5d02893481bbd7a7cf0be949532e45bb_JaffaCakes118.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2848
-
-
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181KB
MD582544a4c699e2944bab822826ea3c3a9
SHA1721464d799cd8c0d832111d6d23c7b4475d0aa74
SHA25603a91e8eec5e51d2100df2de79c930f30ab56a4e7f24df89ac105b07a9aae6d7
SHA512b49d82a91b7874ffa4b387452aafda536dc5f3765539d2e1e4781c907177ec378b8146b73b1c05bd1efa6fbfd31e98cfce75530b9a6e1bb8e72645785314332e
-
Filesize
1.1MB
MD517273563a53466c14b9e002e950ae30e
SHA12f62ec7a00fc35154eefc268d28de6c654b712a6
SHA256172b93729526ce2fb1a0a91a7a7d4bdf2d77d5be8094eab7c6c65614db78267c
SHA51222a97a7982979d64c98b6aeb9abdadf45dece73d3fdd7546051105a801a277e06fffa0070aac7d6d5a13c9d7d70ff6155c43bc75df283fa9615963ade19f0593
-
Filesize
894KB
MD52d9147fe9eed5840c9e6127c64c1d1df
SHA1544b61bc3ebaba3afcb57e876a21c2952d2480b1
SHA256074b52777d2efcfd2de3ff741691f88b5cbfb82e59c97d27025c7e6c83109b20
SHA512f766a38855eec94f533d015230ceab8d032c7f9f0baef009514461d3cd1f9a83623e28953934c52dd3c4675d9a79a1caac9bae82912d977813ac7676b31c7979
-
Filesize
894KB
MD58d9db765c37ee6bb780a807feeb73b83
SHA183cdd906f8aef155a8e56ce2d3dd9c5a70a8a728
SHA256fa5ac6a51a5a533cbbb6e32c99b92ef50161663a3eca5fa3e1e5a39e6d387f79
SHA512d71a73b338ffed2ee73feeb6b720a8a643e994c1f390b35633b8b54de1c1210ab8f0fb24c0f18bbece7ffb13b5b7c5a519a66874c346a3e5dbdc3d7ac866cbc0
-
Filesize
582KB
MD59b2e09364600c83fbed6d682dd75e337
SHA105e84f21fea0e4848ea9ababd516e55a33c680c8
SHA25676eabbd03cba1cecc9d612b5b5c8ecd125fb03909817425a030c4ce0af65b673
SHA512cae5bfbc536f1f900fd0d21fe95b3396a19b1bef5ccd75a37022f8b701f1e15599452dcc0486ee8e80fec9a8638a097bdf766c10eb7439a7cac07440ecaa0dfd
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
159KB
MD54c1366320f27ddfcf6aa1b4266fc16fe
SHA11d14dfaba4495d77e99f1d4c0773177247dfce1d
SHA256cd36df160a464ba3abcfc3d010aae9cc913f29f76878ae38e75eefe1e49c593e
SHA512126b8edf27d9908b13cf90487fd66d3031dde842f5bc1063b6c57f3894c4ac1281f9b54614e75031be77dc9c6b149749003e9b568df9e5dd6bd15b41324cb149
-
Filesize
124KB
MD552cc826a4cf23d5bbf7534f1b30d0bab
SHA1663b42d847db8ee8ca4d23c7a6f7a5357e055a52
SHA2567cfdae4ec5b8c4ab16ff1433fcc1a82d925dd79e36c5a01d24b47ca277f1ef55
SHA512fc03d351cda0e7e5f6112b8a6b4e061df02b7117d0a4f5dcefe12fe5908b0c0c660338055d59ee8cfe70d82f55aa981dbe02dd5d14a70cc813426af6f7fa4eac
-
Filesize
200KB
MD538eead83b531a5b5f22d7ddc2264546a
SHA133548c66f43f4eb79e1abef0c9b132c55ca91b40
SHA2564393a0032b1f3aed3c70947c79894132f5f5a85214d8bac9dfac90ee1a9ad13a
SHA5122a73045ff2685789cbbc176169c9e54c67012b25f479cbea56395c25f11887ff7bd238a0a4ef17554aa3c73e537bbf3308e0b86322571094337dd701dab4f1cc