Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 03:46
Static task
static1
Behavioral task
behavioral1
Sample
2a3d7642a1fbf238e9ad8564d3eb41c5_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
2a3d7642a1fbf238e9ad8564d3eb41c5_JaffaCakes118.exe
-
Size
250KB
-
MD5
2a3d7642a1fbf238e9ad8564d3eb41c5
-
SHA1
67b7f05293b47ffe3f0a6863e6d1f9595dca0ede
-
SHA256
b30dcc7111fc913bed204ba2e3056206d9e91a90695148a3f4df382df1a08fa9
-
SHA512
64fdd416d89147d6d21542152ea9bbee3c9e1a3bf359a394fa52230e217306eb15f8fbe7f713c12c17e2a4e2e7134a10875e81a6b59ebcd12aaef75a5b3f3618
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s55Z9ZHMrDaf+OtUQ95NGzs+:h1OgLdaO5vZcDaJtUis
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023cba-74.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 224 50f512627d756.exe -
Loads dropped DLL 3 IoCs
pid Process 224 50f512627d756.exe 224 50f512627d756.exe 224 50f512627d756.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oammdpghndmjnhjgaeogogefnkockonl\1\manifest.json 50f512627d756.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EA922605-3D57-E082-9FF4-B26BB28602EC} 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EA922605-3D57-E082-9FF4-B26BB28602EC}\ = "SaveSale" 50f512627d756.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EA922605-3D57-E082-9FF4-B26BB28602EC}\NoExplorer = "1" 50f512627d756.exe -
resource yara_rule behavioral2/files/0x0007000000023cba-74.dat upx behavioral2/memory/224-77-0x00000000741C0000-0x00000000741CA000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a3d7642a1fbf238e9ad8564d3eb41c5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 50f512627d756.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0008000000023c9f-31.dat nsis_installer_1 behavioral2/files/0x0008000000023c9f-31.dat nsis_installer_2 behavioral2/files/0x0007000000023cbe-104.dat nsis_installer_1 behavioral2/files/0x0007000000023cbe-104.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\SaveSale\\50f512627d78f.tlb" 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA922605-3D57-E082-9FF4-B26BB28602EC}\ = "SaveSale" 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA922605-3D57-E082-9FF4-B26BB28602EC}\InProcServer32\ThreadingModel = "Apartment" 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA922605-3D57-E082-9FF4-B26BB28602EC}\InProcServer32\ = "C:\\ProgramData\\SaveSale\\50f512627d78f.dll" 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 50f512627d756.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{EA922605-3D57-E082-9FF4-B26BB28602EC}\InProcServer32 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50f512627d756.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{EA922605-3D57-E082-9FF4-B26BB28602EC} 50f512627d756.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{EA922605-3D57-E082-9FF4-B26BB28602EC}\ProgID 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\SaveSale" 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA922605-3D57-E082-9FF4-B26BB28602EC}\ProgID\ = "SaveSale.1" 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 50f512627d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 50f512627d756.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3428 wrote to memory of 224 3428 2a3d7642a1fbf238e9ad8564d3eb41c5_JaffaCakes118.exe 83 PID 3428 wrote to memory of 224 3428 2a3d7642a1fbf238e9ad8564d3eb41c5_JaffaCakes118.exe 83 PID 3428 wrote to memory of 224 3428 2a3d7642a1fbf238e9ad8564d3eb41c5_JaffaCakes118.exe 83 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{EA922605-3D57-E082-9FF4-B26BB28602EC} = "1" 50f512627d756.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 50f512627d756.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a3d7642a1fbf238e9ad8564d3eb41c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a3d7642a1fbf238e9ad8564d3eb41c5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\50f512627d756.exe.\50f512627d756.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
- System policy modification
PID:224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5f3c79bda3fdf7c5dd24d60400a57cadb
SHA11adb606aaeedb246a371c8877c737f0f8c798625
SHA256a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935
-
C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5e2b9bcf63a2db18d2e43ce2aaeee0584
SHA178416da3e8b3d59a29094836e0efed6da0649737
SHA25640a452a0efb4f8cf38166a813615b4e836aabc598e9d9f8ee0249c8ac0e307b2
SHA51220d8d5c38146ebf9a4db93d05cf105e2f861f6b2e2176315410deb47db04ff35ed4252150f20b0d1257381512137892589bd2b469b39174dc02b1ae284b0a684
-
C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\[email protected]\chrome.manifest
Filesize116B
MD5db0c81f5d915a8eced56b32af6f65df3
SHA1200b1c3158db50b0151c710f4dfa05a082f6f1b8
SHA256751d2645922c8a20edef0c2d8c33cd4a21bef0ba212bf1a2402fd800a4b4d072
SHA512033809096df8cf6fb99d2b1ae96dc12ef3f636ffcae27eba47a46e40e9c7bdf2c7f66cb562424edb9d64283fecf8c12bd5590b96eeb8809fb5e1b274a1c9fa5d
-
C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\[email protected]\content\bg.js
Filesize8KB
MD510103be2a07f5321f61873349b4f50d6
SHA1c211bbde8235eceb909a9a19162d9ac97e2f0b9f
SHA256ad5040b12710157cf008020587b22996f05b61d4c7862dc2e460064fa1cc202a
SHA512df4c81b489e0c4b521db3b123c4c05bde80905ed217e16a5fa2eceb276047a0a49d0a2b57d864b1af7d5183d5e49c556be77ce606950cc51e2c2d558069ab623
-
C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\[email protected]\content\zy.xul
Filesize225B
MD5a50c0dba5b0dfc5fa4f505b7c8236bc6
SHA1ea30392669a6fc7ce7a0eb283b1d8968665359f9
SHA25674f579754e6246e850c7a96a0910cd61b0100e5ca58ba4ff86e1fbc2b8aed900
SHA51257d72bf6aaa7fc1314002f345860c18eaae45da6923681b2fecb2c735ec04c7569706ac2aadef91bfbe89d88d8292a8c508e444a5c7674b21207b12ff973394f
-
C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\[email protected]\install.rdf
Filesize705B
MD52f70c42bfc991244c1400306918a41d3
SHA1dd2c685eb1660681f771a245e9f84638b5254e3b
SHA2565fe059e5bb8f6d47ce19fecac2e1a6c1b5e0279a13feb7bef3fee976d4fc557e
SHA512012020350c2c2cc009d3d6d4a962cf141bb995617ac64413168006356e722b50e34eb43b4b755c8fd4e74189584c5b1b8bb3da169e032167c5685957743e40c8
-
Filesize
71KB
MD5b78633fae8aaf5f7e99e9c736f44f9c5
SHA126fc60e29c459891ac0909470ac6c61a1eca1544
SHA256d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA5123885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43
-
Filesize
116KB
MD5da161da8bcb9b8032908cc303602f2ee
SHA18a2d5e5b32376a40f33d6c9881001425ec025205
SHA2560648d564b30e13a0819f28e00a9af39a6686a4d29ccd265c7d81548e4fe0f67e
SHA51239e882a371dbce2484324811bffdd7ae7655b57401d07bf264aced6b5dac0ae326bd1945c536f05d8ab3b92ca03ff056c5a7baf54f7eb477b45fc405ec54052c
-
Filesize
2KB
MD51f14de44d0d63a79f91d3fe90badb5fc
SHA17fcc921608d2cf40e81cdd9a98e1a15a6ba1f57e
SHA256bd3d85c0136a66b2af79d4d91c1c5700c8931937b7e554d5ece946760ef4a99c
SHA51286eb6ebf9eccf1dcb601db827797ac603c0ebe01b6d73318986275c29bd034c8df5f7c79ddf0b19536faf24bdb11e09ac95ea43e8fe75b0ed3dde76dd139883c
-
C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\oammdpghndmjnhjgaeogogefnkockonl\50f512627d5622.92738795.js
Filesize4KB
MD5fc2c2fcca56b87e15afc03181a27969a
SHA1807637375157a042fc32dce2616db21338b05e43
SHA2567c3f6bb45f77b981529c4389ef8325be324a9832a04a1ead19d05db701b9e053
SHA5128a4c6e5f3af393c0e6510ed578452837eba42f76c3307800ba2306ada58f59799abeca29358e5cf78faa4fe15d4595c7500cb6ef4260a6b9a4d07a5d447803db
-
Filesize
161B
MD55412bc0500d2753ebdd8a695dd447d8a
SHA184c3897c7e76d663938902beada670bf9db3d6f5
SHA2561dab39e561fdfd58f4475f37cf7e03135948aa8101e6b19468000e66b9c4bfb0
SHA512ea4fcaad78670b8a080792e3bb606fd289ff83a591e112e9ee43d1807b45ba8e2d031fcbfce3a245076c6c14f8bdc948e38ca874d57d26f686a5154977f1e2d2
-
Filesize
197B
MD55f9891607f65f433b0690bae7088b2c1
SHA1b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA51276018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c
-
Filesize
559B
MD5209b7ae0b6d8c3f9687c979d03b08089
SHA16449f8bff917115eef4e7488fae61942a869200f
SHA256e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA5121b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25
-
Filesize
475B
MD5f91cd42bdfe41bcc97d2eb37eafd8bd2
SHA1c0dd02c8f7959b84bf6583d62ecd308651c37b6d
SHA2566805fc1de5ccc99d653689693aeb3a390116b024eedc26b0ca00a7296ec422a5
SHA5128a043a54c40787174c0f167c0083899757803b06100189a9a485d86ebadfa791b83af0e8a502fd34c2b8b20ad9b4c82cf1c302234db69006cf089e0b7179ab2f
-
Filesize
1KB
MD58eda1541b1f1d464deab4b22db86b4b6
SHA1b46d101dc5df16cfbedf5a06f210cc0168bfca63
SHA2564ef8768a422505540ff90e193594d6499c604473929f883f83948d44c5fc01c1
SHA512141f59cd872753d6cc0cdc6fa1a90a4fabb6c0c02bb9bcaf7eae9e25fc61ded8ec87ed0b2d9df03f319babca75344a50e47726351a62327f6261c02af200ba7c
-
Filesize
6KB
MD5ffa4f149476146b336bb9f77d37411e6
SHA1fbc085d3a1b44d9a3ac26752d58d7dfb1a755170
SHA2563bc585ef2d37a3272fb4d0f379bee820befcc94565d8e0cfcdfcbdea537ec9c7
SHA512cbcc0f3d98f9faf187ac4f2539fdfcca0022c0e396fd4223b18cc4880a905e0027dedd98588485982c280c690b704aedf67372ac997dfabd4c08403f2be76b79
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90