Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
1421700495a595b342eabe8de952a419_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
1421700495a595b342eabe8de952a419_JaffaCakes118.exe
-
Size
255KB
-
MD5
1421700495a595b342eabe8de952a419
-
SHA1
93a81e8a5ee0efaa2c0bb4cdb961eb0368d90b0c
-
SHA256
00a3d4d46632a06ca35cf13b64b1b6324e7b0fe6960db562e89128884468c900
-
SHA512
628d8baa0360274d2ab4fb74095cae3d2268b8b31b2e6d199c6ebee32a55585d424fa023ac682ecd4114a40aab51f01a3113642b404166440d55391a5fd6dc4d
-
SSDEEP
3072:hn1/uEAgDPdkBlyFZ+ScjaiKWbETBquAEXlqsUUhMUnpiPqERIFJZcrT2Bk7MDu6:h1OgDPdkBAFZWjadD4s55hERLuLChw
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0005000000018fca-72.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2576 51e10ddd02354.exe -
Loads dropped DLL 5 IoCs
pid Process 1364 1421700495a595b342eabe8de952a419_JaffaCakes118.exe 2576 51e10ddd02354.exe 2576 51e10ddd02354.exe 2576 51e10ddd02354.exe 2576 51e10ddd02354.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\kogpkpaagpkiefdlnhmebbmmnoklclfd\1\manifest.json 51e10ddd02354.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{910E2E96-39AE-A655-5BEA-B9403BD08A8A} 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{910E2E96-39AE-A655-5BEA-B9403BD08A8A}\ = "saafe asaave" 51e10ddd02354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{910E2E96-39AE-A655-5BEA-B9403BD08A8A}\NoExplorer = "1" 51e10ddd02354.exe -
resource yara_rule behavioral1/memory/2576-73-0x0000000075070000-0x000000007507A000-memory.dmp upx behavioral1/files/0x0005000000018fca-72.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51e10ddd02354.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1421700495a595b342eabe8de952a419_JaffaCakes118.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0005000000018e9f-28.dat nsis_installer_1 behavioral1/files/0x0005000000018e9f-28.dat nsis_installer_2 behavioral1/files/0x000500000001901a-94.dat nsis_installer_1 behavioral1/files/0x000500000001901a-94.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 51e10ddd02354.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{910E2E96-39AE-A655-5BEA-B9403BD08A8A}\InProcServer32 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{910E2E96-39AE-A655-5BEA-B9403BD08A8A}\InProcServer32\ThreadingModel = "Apartment" 51e10ddd02354.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{910E2E96-39AE-A655-5BEA-B9403BD08A8A}\ProgID 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{910E2E96-39AE-A655-5BEA-B9403BD08A8A}\ = "saafe asaave" 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{910E2E96-39AE-A655-5BEA-B9403BD08A8A}\InProcServer32\ = "C:\\ProgramData\\saafe asaave\\51e10ddd0238d.dll" 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{910E2E96-39AE-A655-5BEA-B9403BD08A8A}\ProgID\ = "saafe asaave.1" 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 51e10ddd02354.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{910E2E96-39AE-A655-5BEA-B9403BD08A8A} 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\saafe asaave" 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\saafe asaave\\51e10ddd0238d.tlb" 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51e10ddd02354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 51e10ddd02354.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2576 1364 1421700495a595b342eabe8de952a419_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2576 1364 1421700495a595b342eabe8de952a419_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2576 1364 1421700495a595b342eabe8de952a419_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2576 1364 1421700495a595b342eabe8de952a419_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2576 1364 1421700495a595b342eabe8de952a419_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2576 1364 1421700495a595b342eabe8de952a419_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2576 1364 1421700495a595b342eabe8de952a419_JaffaCakes118.exe 30 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 51e10ddd02354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{910E2E96-39AE-A655-5BEA-B9403BD08A8A} = "1" 51e10ddd02354.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1421700495a595b342eabe8de952a419_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1421700495a595b342eabe8de952a419_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\7zS3D6E.tmp\51e10ddd02354.exe.\51e10ddd02354.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
- System policy modification
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5f3c79bda3fdf7c5dd24d60400a57cadb
SHA11adb606aaeedb246a371c8877c737f0f8c798625
SHA256a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935
-
Filesize
116KB
MD505234975b085632d70d89c2f420c5107
SHA1078fb2a3e5de54c3737a4541242a4725c02c6b9c
SHA256a758ad4fdc8949ea005258075457a972eb0672d69d98d688117b85221fca096a
SHA512f9fa6aee142e32875127feadebbe235f4f376b0c3b7415036b8afc81c0a09a8ba0c5ec9e1703f1a34b220b7646caa1ca02629918185c4afbafe6926014044c4e
-
Filesize
18KB
MD5c1e296ff01d3cf37f91c7473bdd9de52
SHA1832e3d1ddeb5a0ceb5b13c1ee271eb94bf9bf2a6
SHA256a8e54ad3e1fbc91d5a7b02bf177a24a02f2558419ce46859bf15859b81478492
SHA512aeb1f3962746caa3858c27b4753959d5ec9db2727e94642d5db2710633a96e7ceef5f9c0ff3b358f83143b6594459b5d9a94e095fed7a5d1fa97ae6a3c4e564c
-
C:\Users\Admin\AppData\Local\Temp\7zS3D6E.tmp\kogpkpaagpkiefdlnhmebbmmnoklclfd\51e10ddd0217d7.20004303.js
Filesize4KB
MD535adce88c87531c25e590973329c26c0
SHA1cf127bcef50c988a5c1db0788ec68904b81c8c57
SHA256dead6cf420d066337b64d8ff0081202aa5f776fa7b62853f04e5423e1b05dfd3
SHA512eff370657110bf72e71b6e181c35060627836de71945b21bc54a8a98b0101a092681d471ca08195d112022c408b9441600dec4342438f55c3f5e507c2f996335
-
Filesize
161B
MD5d4acad085ca4f373e44846e3b63f67d6
SHA1942ebea46b2ebc1732e884cde0b9dd9f79a3c7d9
SHA2561f86abfdca2138b71aa7df0b2e32b5f50e53591d2288392997cf33f42b0229ec
SHA51275f8426c0e25be58a44aada39e5e137f90d928a11af61ff059935db654b6d064ed2bd278512b7504a73c0442e7c72cd902a17f35b8cac69cfb58bc39478356e9
-
Filesize
197B
MD55f9891607f65f433b0690bae7088b2c1
SHA1b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA51276018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c
-
Filesize
559B
MD5209b7ae0b6d8c3f9687c979d03b08089
SHA16449f8bff917115eef4e7488fae61942a869200f
SHA256e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA5121b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25
-
Filesize
504B
MD581c0747c1079a3d8c98568565b1874e2
SHA1c792d52b988a87b7505386acc8ff58e12e0e4c8b
SHA2564b7e3c90cf446cb8d22b0ab181cd37686459ede5b0c0b2593d2663ad5d159cfc
SHA512b5adb6d35b756c97758f160c1018e510991a82d48dd61ab0db597d25d4af0c5e79f81338c3a0283dc2cf583a524861ee8818efbae6242e76aa619d54029faa6f
-
Filesize
1KB
MD5d8ebefd42fa96e62b47f3ee79b4b2264
SHA12da8bce715efe3ae0418826bcdfedbfd75aff86c
SHA2567f77c262ff12f2d682ad374d58af06ced7966643b9498612691e6f2badf5c8e2
SHA512822650c250d78a404d0519bdacc04d8d3febdc551a4a0c055b61520373fa09dfcc5e132acff88ec70f8a3133adbaaf100bf5f61d88cda9277489b1e31c938dda
-
Filesize
6KB
MD55b155d6298b055f77b0ee5c277c42074
SHA123a04a86db65ef20f198ad36011d1d91d55a4fb7
SHA2562511ac8976f01e75f5f04b0163ff53f2f89124fd4806ffbf5ca701052d10070a
SHA512cc5050d816c899a175114111c00c70756f3868d8f625402ead183ac8cc35c9842cb28ed93c19263b6af6cd02008db1ce0a0295d1340abf1c99854725f9964819
-
C:\Users\Admin\AppData\Local\Temp\7zS3D6E.tmp\[email protected]\bootstrap.js
Filesize2KB
MD55d42a430536051aa88d5f1450c0caab1
SHA171297eb09ade8e0a48e8ca59c976c3a9aa0e1269
SHA256b9de3041a9cff45ba0041ed3b4cd88e9d5e4f38b548b1cd03efa72b4395bf6a7
SHA512a3803f6a4b525319b8b4b0848cc353380a65bf5f12f63bc146b9364e8ceb1a7600af70463429850f3804ce77571f1e100d29929e72ba45c157b2bbbb3ba1670d
-
C:\Users\Admin\AppData\Local\Temp\7zS3D6E.tmp\[email protected]\chrome.manifest
Filesize116B
MD5e8903ad56c9608c0eff3ff0cdfbdf498
SHA1fb685e4af6f11ed503c62f1c00bd3f2b2ef2d888
SHA25619a705dbb3cb77753cdba82ca0773977bc1f2931c5d449371cfe660eb870df3f
SHA51268242dd5dd682380f377168cece951934f3f3e61e731cfc46a51fe626197069189cfbfed1e961843a52613cfd2b6f24f59ca1a944c237d91320f4e8ffdb871d8
-
C:\Users\Admin\AppData\Local\Temp\7zS3D6E.tmp\[email protected]\content\bg.js
Filesize8KB
MD510861e6e50b54782c753305cada34f4c
SHA187c71a69e199123410aee60cb92fbf5dc6683345
SHA2566d503ce20e4a058c24b7295664131ecf9a8f85784dcacca93748e8d3ac0cf47e
SHA512d129051e3e9b87a3b5017fb9fea07bb46353d063a7506124c00a454d58c95b01e330efcb4f98c2f03a440c338d62cf032fd375afc7fdc8d5a8678831a3c9a93b
-
C:\Users\Admin\AppData\Local\Temp\7zS3D6E.tmp\[email protected]\install.rdf
Filesize601B
MD5d74b9512fb31cf7acbd145a48fb8891a
SHA1d450f3f1768b3e8d9ec79545d0302c6ea7102774
SHA2561703b2ad7418f04787bb16f84cd2c309aff51ef007a85140028428a99cbfab77
SHA512f522cad385927eb6b502bd3801926b9aaebc12904c7de11a1d65c0d97ee9d0a2722977808d289218706d2dd4fcdd5732640ca295c736ed2766daae7c94c44bc8
-
Filesize
71KB
MD5b78633fae8aaf5f7e99e9c736f44f9c5
SHA126fc60e29c459891ac0909470ac6c61a1eca1544
SHA256d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA5123885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90