Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 05:24
Static task
static1
Behavioral task
behavioral1
Sample
58c285c3df955356b0de4fd8366aafca_JaffaCakes118.ps1
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
58c285c3df955356b0de4fd8366aafca_JaffaCakes118.ps1
Resource
win10v2004-20240426-en
General
-
Target
58c285c3df955356b0de4fd8366aafca_JaffaCakes118.ps1
-
Size
903KB
-
MD5
58c285c3df955356b0de4fd8366aafca
-
SHA1
4573f3abf225c00fddeb3ebdace7bf77bbe04b15
-
SHA256
0b1f6d6c3d5008efd67b9eeebbea8c2e04a2fe3f9ee5db01004384c1419cc170
-
SHA512
c6eb9f8a638f221000783451e4dc3576836a4a34d842c9e8850e2f58e0e5c82b942f31fba8f705532c6cc85057872b2a059e72b40644fdd0c64c3e4a6abb5622
-
SSDEEP
12288:UlKC3i/930kve4tUwcuVJEb1OK4RtGIyc/ZFvRWwajB16I6WY0aMAnbfMeAoJRxI:o
Malware Config
Extracted
C:\Program Files\Microsoft Office\Office14\35A0AF-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Signatures
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Renames multiple (7416) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSPUB.DEV_COL.HXC powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107452.WMF powershell.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\MANIFEST.MF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GROOVE_COL.HXT powershell.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL00298_.WMF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL097.XML powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21324_.GIF powershell.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-ui_zh_CN.jar powershell.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\epl-v10.html powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0285444.WMF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\XLMACRO.CHM powershell.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Vevay powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Formal.dotx powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR7B.GIF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSGR3EN.LEX powershell.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Fakaofo powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\RTF_BOLD.GIF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107364.WMF powershell.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Folder-48.png powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_increaseindent.gif powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00452_.WMF powershell.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.core.services_1.2.1.v20140808-1251.jar powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR36F.GIF powershell.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Scoresbysund powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR1B.GIF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21427_.GIF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD00141_.WMF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SoftBlue\background.gif powershell.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\vlc.mo powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382939.JPG powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00057_.WMF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsHomePage.html powershell.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\PST8PDT powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Lime\TAB_OFF.GIF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105368.WMF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00732_.WMF powershell.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kuala_Lumpur powershell.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\35A0AF-Readme.txt powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR45B.GIF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Text.zip powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02073_.GIF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR47F.GIF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Newsprint.xml powershell.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\MAIN.XML powershell.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\diagnostic-command-16.png powershell.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.nl_ja_4.4.0.v20140623020002.jar powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BabyBlue.css powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0313896.JPG powershell.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ko.pak powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL054.XML powershell.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\35A0AF-Readme.txt powershell.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Scoresbysund powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGBOXES.DPV powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143744.GIF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00252_.WMF powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.MY.XML powershell.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt_0.11.101.v20140818-1343.jar powershell.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue.css powershell.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\sunec.jar powershell.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-api_zh_CN.jar powershell.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+12 powershell.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.sig powershell.exe -
pid Process 1240 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe 1240 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1240 powershell.exe Token: SeDebugPrivilege 1240 powershell.exe Token: SeImpersonatePrivilege 1240 powershell.exe Token: SeBackupPrivilege 5972 vssvc.exe Token: SeRestorePrivilege 5972 vssvc.exe Token: SeAuditPrivilege 5972 vssvc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2544 1240 powershell.exe 29 PID 1240 wrote to memory of 2544 1240 powershell.exe 29 PID 1240 wrote to memory of 2544 1240 powershell.exe 29 PID 2544 wrote to memory of 2656 2544 csc.exe 30 PID 2544 wrote to memory of 2656 2544 csc.exe 30 PID 2544 wrote to memory of 2656 2544 csc.exe 30 PID 1240 wrote to memory of 2744 1240 powershell.exe 31 PID 1240 wrote to memory of 2744 1240 powershell.exe 31 PID 1240 wrote to memory of 2744 1240 powershell.exe 31 PID 2744 wrote to memory of 2736 2744 csc.exe 32 PID 2744 wrote to memory of 2736 2744 csc.exe 32 PID 2744 wrote to memory of 2736 2744 csc.exe 32 PID 1240 wrote to memory of 10904 1240 powershell.exe 37 PID 1240 wrote to memory of 10904 1240 powershell.exe 37 PID 1240 wrote to memory of 10904 1240 powershell.exe 37 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\58c285c3df955356b0de4fd8366aafca_JaffaCakes118.ps11⤵
- Drops file in Program Files directory
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rgnhujj8.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES10D3.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC10D2.tmp"3⤵PID:2656
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\u7mc3gsb.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES118F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC118E.tmp"3⤵PID:2736
-
-
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\35A0AF-Readme.txt"2⤵PID:10904
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5453f7f410d53a3ac7a45b15169d7db11
SHA1fe86d1828c878898cc792047d6fbe2afcb569ff9
SHA25611dd05654a6e4a089bf8cd351af7a116bcd391a1e198804ca6a83d83eb450e3a
SHA5122dea25fdbe1d87f0f41381c5e37b2a3e1e51c9b0f34747c93710d033f4d8ff04d15f3f5ce311f0d55d3dc102bc6d1d1ba61557c63604e296c87f986efcfbf523
-
Filesize
12KB
MD569d48e7aa48a8f337c1d58846240cc04
SHA18965e01ea9ee6ae66fd13586e637c22c584ff84d
SHA256ece4d5bb332a01cb5ccd0cae13d2b74240ed2c7c9868309428e76966ff493b4a
SHA512a90f83bf866c51c750edb55ca13df8224e5ee8147bf00500259a35863aae4921262e1ffffd6820cab53909fa1d5ddc683f8b6e83eac8ab04b33748ae711ebcb8
-
Filesize
201KB
MD507569cb13e6a5b682adb0e45f44fb017
SHA1e5375478d280a58b497dd295505099b36efd96d3
SHA25684685bb2c5de1f7079f1d74e049a8e29cf7eec063bbdca99e4624603825ba335
SHA512508a2a25b6c1261b9cd40bc834df8d099714dcf3c96981599dfeeb86c4288b06dfbcb17c045a1664f67ebb4b0c17607cf5e9caa71252313e7c3962b7ee3aebbb
-
C:\ProgramData\Microsoft\Assistance\Client\1.0\en-US\Help{9DAA54E8-CD95-4107-8E7F-BA3F24732D95}.H1Q.35a0af
Filesize864KB
MD576f5226a41f2528b15620156f24fdbc0
SHA19688eeff3b7a927ba4454628b1fcc6247aac7920
SHA256bf2de366f9fb09cecef9aa41878ec3d0873314b7b62b492ee65af512561b5fc9
SHA5121af0bfeedaaa279c75108a03794bc5500de81dc2953de503ccff394574e3ae774a9fedc6ff65ec7e4c4b88abfcd100c997180a701a4d23bfc6e4f11e8d1f8eec
-
Filesize
197KB
MD56a17f1e83b869aaa6ac9b08dede88084
SHA1b8557f50a11ac66f7c2f84e579c0863858dbfe44
SHA256f5d0d7c5a0a3a4bb6f2e41274216d24aafb758d627ef7bdd44f6781001e2fe91
SHA5125f794cc508458e8d06e5152c54cfd6cc5f3957057cbca0b970b2bf87b3d6d5ee41c74c138f041ec314f06efa6946c730a7bdb0d247d04485a7c1dfed3e169881
-
Filesize
92KB
MD59091c17dcac4e576bc5e358c3b72ed33
SHA1881c5ceb3f45c43f5de55d2a6037b0fdde891789
SHA2568a0812a9ae312aafb0a1bab3522a4a61d42164cf5a613e4e140ce475d1895506
SHA512e0e07e8d86f339dcc6ebe8e0030cc7ce8c3ba386c7c1749bd29f2dd56b5525db0eb6c840f52ae97a4cbf1ed4e98fec59eb730cfdfc43e480b9e2b2517a7dd597
-
Filesize
1KB
MD53ca821ac403b0e6b52c25dbf0fcb2453
SHA1a333d01afebd8af43ca8ddd2ecb5e949e428789c
SHA2569548df1e40961a1d59506145ea42303d5318171417821fd8758a47303c926814
SHA512e2140a5641fc448a8145800de4fcb8557c27994797b761a33027ce604deff10c350b43053b395b0291c32885bc43b6a23cdb7687daf03af9dab30dc386921765
-
Filesize
1KB
MD5ffd41661f060c3e9f72bec47edce3729
SHA16c2d69987c3119fc6a71901ef103a7aa16e7cb28
SHA256f6edc865af41f30ee27fa9e3eb851131bb5c4e50313dae6003b6f483d059a491
SHA512f3668f97db31cfb48ea307ba3beb80891fbbd1dbb1d70d285689133eb2b73817054ebbfdb5612d98dd4663d4319212f6fab3ddcbe2a7c1b697ce7c941cae3f8b
-
Filesize
6KB
MD5e317b4070219e92adf0078e492a09bcd
SHA1893a7a62887f55f13a151cd407c25601c1e87bba
SHA256a17d1748021cea1cb10666b417c84b18e656204e19d18e813a54d052e14af99c
SHA512b404a4abdbd83a32523b655b567635341daad43d568a25f314b5b4eb816914fd587f59f8855f0345e757267c023d241131e1bf188fb259cdbd3119e12c066b08
-
Filesize
7KB
MD5b7c898226333c870c47e89902f4899ef
SHA1dc113f192c87889e5fb190fa4e122daa49b8a88e
SHA256fba5fd89e390b2ed9aad0386ddf82a70fbb6453d856489e2792355111c8d3fed
SHA5127eaa3723fc4bda8cc7d1a356d139e813ea88d646469422f08feef26a5cac37ab217ec554f53e55a86f1da29fe23bd3aa1afc061de3217cc37c424053921713a6
-
Filesize
4KB
MD5f38d09fde0834e07d30f1204bdf8e134
SHA12453d2b286f9452e4c2264f4b3a8d7fa28a2034f
SHA256274ce8e6f6c14cacb3b3bdc1e3f5067afe089bc8f4b6d61087d76553f85647d3
SHA5124fee917dcac23b2faa95049e89b7fa58e316f2fe5ff780d1335caa6cffcc58b601d9e82d4fc7768dac9f35470ca847076c1f691f52d6ceea9452348351cd1d96
-
Filesize
7KB
MD5585f3a043066df2a13e829e8be14025e
SHA1105d55232557c18fcdc3d35dfe7eb9ae8b15643a
SHA256c3034199a710c12b7234561e34dc1bfb9eedaffca2d1c29465d67fb74c527bdc
SHA512978d69c471b4ca1d005f15e627c5e753eb936801e3ba2095e210e4b09e8bc1d929a2168894ae42276a675da1f1f9be07d573e1ae39babe52a71903af649a900b
-
Filesize
652B
MD51e9b8fa041fefa3a8c88895f700b1827
SHA1649032dec487e568ce31e8da72c1f53a21fdf276
SHA2565240227e663e59a28fcb9bcfe278042f5fdf469fa0b09657d9d7c86bb72515f2
SHA5128cdebaa43380b45c9a1da2f169f791d1cf335d6efb608dadab27e2faf1d9245e39d152354a6a27fff636f04ddaa15ab887da1ec08e2bdbabdd5834426054d6cf
-
Filesize
652B
MD5835dcde695bfc6ec3af9d004e7232fee
SHA1df071dc3ff7b2dcbbbcff9f7819593a88887b953
SHA2562d39d183f9752992e4b7dd3e61724e62eaf9f9fdea0fe2432550df90775947f9
SHA512ada66aebc75b86782c9732d02c1ad5f9faa42c21766af91a9fcd0ae6a8b2229c434b09c3792474b637da42db9d9c316dc258d7c91a82513a266066dbc441fc3e
-
Filesize
8KB
MD507086ea98fed0079427b7f0710fe62e0
SHA18bd780bdb9a03d88f32ebef8549509a697fe0102
SHA256eab011089366b76f3f371a62efbe22340ed3adbd2cd5a46a5558c3faac101fff
SHA512d1b4741ca1d09f5b8e72e43c6d08a8f6d69d14cac46bf3c42004e0105e18e892f2ea44f3b28a984779c3c047f5641431148c39bf0eb09093473d2c105c4d2d97
-
Filesize
309B
MD5edb4ab9f5fe3bd4d3333463940a0e22d
SHA111d575b68f017ee0aa7e8cfc205009a77b71934e
SHA256aebeb067d09af438228e7f33fbc356265a34728471e8c79d90f4c28e0807b199
SHA512193e8db6fc8e9f63f37f083cf01cb6c648fab6b8a33b1b2470b05c4b2b0d5cdbc84cbac46c2b59e6fcebb29f9fc67f8ea6569fb30351bf948d9a635239789cf5
-
Filesize
2KB
MD5c97bbb0991bdcc70f6cd23e863029f03
SHA13f21d01b0970a323b090056e285b4261c784cb19
SHA256c59ec8f208e5dd9e310b3ca6a2148c22ff52ada68d15e2cd0ade4a819a20208a
SHA512436100ea9f52ae49a6c5179d12464a1e18bb0cbfddb4545774d582fe2d5c269efdf6bce97ad84deb3419f29f4ba0572a1ccebd5beb70ecd98c7c59ed77f4196d
-
Filesize
309B
MD5b351082ff318e4493396edf3f9f0534d
SHA1c172f5c2e4fc1d93724b943ce2d8b8c2b6ea3335
SHA256af2494826a7b5896e6be54f9883f5b00a5983c01a2f18683b329d24daa15ee39
SHA512a1ec8b6e6724db5460068d427e5058bd058eedb6aee91e1cc1580ae6d7c25d806bec070a031e45870907df1cd11ee16650fcb9b88bc9cadc7e247042078a0ef9