Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 13:35
Behavioral task
behavioral1
Sample
JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe
-
Size
317KB
-
MD5
408f04809f3d0e09723cc9fdddf12e74
-
SHA1
64bb2cd6c32fb3370e40ba082690eb4a410f46fa
-
SHA256
1c00e6a434730bf5f5f9dd8a04ed21e86f6c5f535b7d4e2c0937115e565f18be
-
SHA512
2c0210de11b0b83ccae2f42facfd75752953b83f6569a493aed29a7169f7be1fb36bf112f77dc9933e968a9fadc6253003195ff6ed44ff844d77fd4ccd057407
-
SSDEEP
6144:RBHXeCz+zA75F5fMUhONc7D/IbiosVai6F2xZGoHTevoGxoSj:Hvz+wreUhONcfAbioo6noHTbGxoSj
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 11 IoCs
resource yara_rule behavioral1/memory/308-56-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/308-62-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/308-73-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/308-76-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/308-79-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/308-81-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/308-83-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/308-86-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/308-90-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/308-95-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/308-100-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\MicrosoftOS.exe = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftOS.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\svchost.exe = "C:\\Windows\\svchost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2660 svchost.exe 308 svchost.exe 2552 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Protection = "C:\\Windows\\svchost.exe" reg.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2660 set thread context of 308 2660 svchost.exe 38 PID 2660 set thread context of 2552 2660 svchost.exe 43 -
resource yara_rule behavioral1/memory/1956-0-0x0000000000400000-0x00000000008A4000-memory.dmp upx behavioral1/files/0x0031000000016689-37.dat upx behavioral1/memory/2660-46-0x0000000000400000-0x00000000008A4000-memory.dmp upx behavioral1/memory/1956-48-0x0000000000400000-0x00000000008A4000-memory.dmp upx behavioral1/memory/308-52-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/308-56-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/308-55-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/308-62-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2660-70-0x0000000000400000-0x00000000008A4000-memory.dmp upx behavioral1/memory/308-73-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/308-76-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/308-79-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/308-81-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/308-83-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/308-86-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/308-90-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/308-95-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/308-100-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe File opened for modification C:\Windows\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1340 reg.exe 1712 reg.exe 2912 reg.exe 944 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 308 svchost.exe Token: SeCreateTokenPrivilege 308 svchost.exe Token: SeAssignPrimaryTokenPrivilege 308 svchost.exe Token: SeLockMemoryPrivilege 308 svchost.exe Token: SeIncreaseQuotaPrivilege 308 svchost.exe Token: SeMachineAccountPrivilege 308 svchost.exe Token: SeTcbPrivilege 308 svchost.exe Token: SeSecurityPrivilege 308 svchost.exe Token: SeTakeOwnershipPrivilege 308 svchost.exe Token: SeLoadDriverPrivilege 308 svchost.exe Token: SeSystemProfilePrivilege 308 svchost.exe Token: SeSystemtimePrivilege 308 svchost.exe Token: SeProfSingleProcessPrivilege 308 svchost.exe Token: SeIncBasePriorityPrivilege 308 svchost.exe Token: SeCreatePagefilePrivilege 308 svchost.exe Token: SeCreatePermanentPrivilege 308 svchost.exe Token: SeBackupPrivilege 308 svchost.exe Token: SeRestorePrivilege 308 svchost.exe Token: SeShutdownPrivilege 308 svchost.exe Token: SeDebugPrivilege 308 svchost.exe Token: SeAuditPrivilege 308 svchost.exe Token: SeSystemEnvironmentPrivilege 308 svchost.exe Token: SeChangeNotifyPrivilege 308 svchost.exe Token: SeRemoteShutdownPrivilege 308 svchost.exe Token: SeUndockPrivilege 308 svchost.exe Token: SeSyncAgentPrivilege 308 svchost.exe Token: SeEnableDelegationPrivilege 308 svchost.exe Token: SeManageVolumePrivilege 308 svchost.exe Token: SeImpersonatePrivilege 308 svchost.exe Token: SeCreateGlobalPrivilege 308 svchost.exe Token: 31 308 svchost.exe Token: 32 308 svchost.exe Token: 33 308 svchost.exe Token: 34 308 svchost.exe Token: 35 308 svchost.exe Token: SeDebugPrivilege 2552 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 2660 svchost.exe 308 svchost.exe 308 svchost.exe 2552 svchost.exe 308 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2740 1956 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 30 PID 1956 wrote to memory of 2740 1956 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 30 PID 1956 wrote to memory of 2740 1956 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 30 PID 1956 wrote to memory of 2740 1956 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 30 PID 2740 wrote to memory of 2592 2740 cmd.exe 32 PID 2740 wrote to memory of 2592 2740 cmd.exe 32 PID 2740 wrote to memory of 2592 2740 cmd.exe 32 PID 2740 wrote to memory of 2592 2740 cmd.exe 32 PID 2740 wrote to memory of 2844 2740 cmd.exe 33 PID 2740 wrote to memory of 2844 2740 cmd.exe 33 PID 2740 wrote to memory of 2844 2740 cmd.exe 33 PID 2740 wrote to memory of 2844 2740 cmd.exe 33 PID 1956 wrote to memory of 2812 1956 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 34 PID 1956 wrote to memory of 2812 1956 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 34 PID 1956 wrote to memory of 2812 1956 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 34 PID 1956 wrote to memory of 2812 1956 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 34 PID 2812 wrote to memory of 2640 2812 cmd.exe 36 PID 2812 wrote to memory of 2640 2812 cmd.exe 36 PID 2812 wrote to memory of 2640 2812 cmd.exe 36 PID 2812 wrote to memory of 2640 2812 cmd.exe 36 PID 1956 wrote to memory of 2660 1956 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 37 PID 1956 wrote to memory of 2660 1956 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 37 PID 1956 wrote to memory of 2660 1956 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 37 PID 1956 wrote to memory of 2660 1956 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 37 PID 2660 wrote to memory of 308 2660 svchost.exe 38 PID 2660 wrote to memory of 308 2660 svchost.exe 38 PID 2660 wrote to memory of 308 2660 svchost.exe 38 PID 2660 wrote to memory of 308 2660 svchost.exe 38 PID 2660 wrote to memory of 308 2660 svchost.exe 38 PID 2660 wrote to memory of 308 2660 svchost.exe 38 PID 2660 wrote to memory of 308 2660 svchost.exe 38 PID 2660 wrote to memory of 308 2660 svchost.exe 38 PID 2660 wrote to memory of 308 2660 svchost.exe 38 PID 308 wrote to memory of 1416 308 svchost.exe 39 PID 308 wrote to memory of 1416 308 svchost.exe 39 PID 308 wrote to memory of 1416 308 svchost.exe 39 PID 308 wrote to memory of 1416 308 svchost.exe 39 PID 308 wrote to memory of 2000 308 svchost.exe 40 PID 308 wrote to memory of 2000 308 svchost.exe 40 PID 308 wrote to memory of 2000 308 svchost.exe 40 PID 308 wrote to memory of 2000 308 svchost.exe 40 PID 308 wrote to memory of 2028 308 svchost.exe 41 PID 308 wrote to memory of 2028 308 svchost.exe 41 PID 308 wrote to memory of 2028 308 svchost.exe 41 PID 308 wrote to memory of 2028 308 svchost.exe 41 PID 308 wrote to memory of 1680 308 svchost.exe 42 PID 308 wrote to memory of 1680 308 svchost.exe 42 PID 308 wrote to memory of 1680 308 svchost.exe 42 PID 308 wrote to memory of 1680 308 svchost.exe 42 PID 2660 wrote to memory of 2552 2660 svchost.exe 43 PID 2660 wrote to memory of 2552 2660 svchost.exe 43 PID 2660 wrote to memory of 2552 2660 svchost.exe 43 PID 2660 wrote to memory of 2552 2660 svchost.exe 43 PID 2660 wrote to memory of 2552 2660 svchost.exe 43 PID 2660 wrote to memory of 2552 2660 svchost.exe 43 PID 2660 wrote to memory of 2552 2660 svchost.exe 43 PID 2660 wrote to memory of 2552 2660 svchost.exe 43 PID 1416 wrote to memory of 1340 1416 cmd.exe 48 PID 1416 wrote to memory of 1340 1416 cmd.exe 48 PID 1416 wrote to memory of 1340 1416 cmd.exe 48 PID 1416 wrote to memory of 1340 1416 cmd.exe 48 PID 2000 wrote to memory of 944 2000 cmd.exe 49 PID 2000 wrote to memory of 944 2000 cmd.exe 49 PID 2000 wrote to memory of 944 2000 cmd.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ZUTALA.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\reg.exeREG ADD3⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OCjpX.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Protection" /t REG_SZ /d "C:\Windows\svchost.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1340
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\svchost.exe" /t REG_SZ /d "C:\Windows\svchost.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\svchost.exe" /t REG_SZ /d "C:\Windows\svchost.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:944
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\MicrosoftOS.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MicrosoftOS.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\MicrosoftOS.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MicrosoftOS.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1712
-
-
-
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD545e7c508c09ab298be38f6dd6d0092e6
SHA19d0cc4bddd244cc7d54d35efe9b6794e21624a35
SHA2568d8907152fbb1d9cd5e6c34ef7c70beccb4ff96f00b71da7df3e9cfc8a1ccc65
SHA51294b6682eab9c94d328922cab52d9017765d1fee2cceba8138c0cb20e80e13d756d92213fa2f44fa0134fabed0e5dbfcc39ea3320e10bf57903e45713f4e00119
-
Filesize
148B
MD5742480e2dd4101d455075e597bb952b2
SHA1d22a306942ae6e6754a88492e5d60527589cd1e7
SHA2566628da6b7a4abb02ba8986b4857f0b3bf23a81244d00c30e1288522700dc4873
SHA5125e83d4253fb448712b7631aba304bbee9c6e37bb098aeffef93330532940a40b422b9b8f61667c92daf8e283507ed2755586b9fdfa31f355dd2a938a6e2cd5d8
-
Filesize
317KB
MD5408f04809f3d0e09723cc9fdddf12e74
SHA164bb2cd6c32fb3370e40ba082690eb4a410f46fa
SHA2561c00e6a434730bf5f5f9dd8a04ed21e86f6c5f535b7d4e2c0937115e565f18be
SHA5122c0210de11b0b83ccae2f42facfd75752953b83f6569a493aed29a7169f7be1fb36bf112f77dc9933e968a9fadc6253003195ff6ed44ff844d77fd4ccd057407