Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
38124528ab1c81586291245ea6e9ebca_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
38124528ab1c81586291245ea6e9ebca_JaffaCakes118.exe
-
Size
250KB
-
MD5
38124528ab1c81586291245ea6e9ebca
-
SHA1
b4d2b929c28fd0aa19e10b1be0c99eae0f0cce78
-
SHA256
8705afa9354f7ebc39e8f7a076aba07ad9873cd6a11191251b745cb96d1dcb1e
-
SHA512
4a9e926729ee3761c500bbf05a1e2f5eadb06209afec1c8dc1f63e3eabd5f9cfa0d6643a87a8bce9d36bec5c9b770966df905bc6dcca771af4f1032f4ca087f4
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5jxRzijQPSH7eJ:h1OgLdaOjxRJPSHCJ
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023c95-74.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2640 5102b012ce8b7.exe -
Loads dropped DLL 3 IoCs
pid Process 2640 5102b012ce8b7.exe 2640 5102b012ce8b7.exe 2640 5102b012ce8b7.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\kjjlbdoofhdbhfdgedkjbkfiohpolakj\1\manifest.json 5102b012ce8b7.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4F15F33C-E7D7-FEB2-D770-B3813C8CE673}\NoExplorer = "1" 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4F15F33C-E7D7-FEB2-D770-B3813C8CE673} 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4F15F33C-E7D7-FEB2-D770-B3813C8CE673}\ = "SaveAs" 5102b012ce8b7.exe -
resource yara_rule behavioral2/files/0x0007000000023c95-74.dat upx behavioral2/memory/2640-77-0x00000000746A0000-0x00000000746AA000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5102b012ce8b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38124528ab1c81586291245ea6e9ebca_JaffaCakes118.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0007000000023c7c-31.dat nsis_installer_1 behavioral2/files/0x0007000000023c7c-31.dat nsis_installer_2 behavioral2/files/0x0007000000023c99-104.dat nsis_installer_1 behavioral2/files/0x0007000000023c99-104.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\SaveAs" 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F15F33C-E7D7-FEB2-D770-B3813C8CE673}\ = "SaveAs" 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{4F15F33C-E7D7-FEB2-D770-B3813C8CE673}\ProgID 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F15F33C-E7D7-FEB2-D770-B3813C8CE673}\ProgID\ = "SaveAs.1" 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{4F15F33C-E7D7-FEB2-D770-B3813C8CE673}\InProcServer32 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{4F15F33C-E7D7-FEB2-D770-B3813C8CE673} 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F15F33C-E7D7-FEB2-D770-B3813C8CE673}\InProcServer32\ = "C:\\ProgramData\\SaveAs\\5102b012ce8f0.dll" 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F15F33C-E7D7-FEB2-D770-B3813C8CE673}\InProcServer32\ThreadingModel = "Apartment" 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\SaveAs\\5102b012ce8f0.tlb" 5102b012ce8b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 5102b012ce8b7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2640 2472 38124528ab1c81586291245ea6e9ebca_JaffaCakes118.exe 82 PID 2472 wrote to memory of 2640 2472 38124528ab1c81586291245ea6e9ebca_JaffaCakes118.exe 82 PID 2472 wrote to memory of 2640 2472 38124528ab1c81586291245ea6e9ebca_JaffaCakes118.exe 82 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 5102b012ce8b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{4F15F33C-E7D7-FEB2-D770-B3813C8CE673} = "1" 5102b012ce8b7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38124528ab1c81586291245ea6e9ebca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\38124528ab1c81586291245ea6e9ebca_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\7zSB0D1.tmp\5102b012ce8b7.exe.\5102b012ce8b7.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
- System policy modification
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5f3c79bda3fdf7c5dd24d60400a57cadb
SHA11adb606aaeedb246a371c8877c737f0f8c798625
SHA256a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935
-
C:\Users\Admin\AppData\Local\Temp\7zSB0D1.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5e9f9683ec99a4d3ec4edb637c9948734
SHA1462fbb156278fee48eb4c7f4ca35e6a701ace611
SHA256bcc2220af4c26e49d93e1793d92155275ae64e275fa4f28805b78bc1bb8a0f11
SHA51268d486b68627e473daee75425459371eb2bae675a41d04a75a421f6c7b381acc79517c79dcd11ae455f59541d48cd8c7e55d211a0c30182e4d8393e8e48e3446
-
C:\Users\Admin\AppData\Local\Temp\7zSB0D1.tmp\[email protected]\chrome.manifest
Filesize116B
MD560c754c346378df44734531e60cea553
SHA17bd26ebfc623cb7c0ed72e644ad96d4480a0958e
SHA2564683fa862654ea92c87b10d0343a1cac8e7427111a2dc74e661fd0838fa1a4a4
SHA512175132db7c52feae8780050a86b8aa22aec128f81ed77893c54067139eea9b2e5d44f3f17abd910c205afbf17acda1fcfe8b93ce6c601f46bcdade330fccb34d
-
C:\Users\Admin\AppData\Local\Temp\7zSB0D1.tmp\[email protected]\content\bg.js
Filesize8KB
MD581a8ab25b5a059b74f9c827bba1eb4c0
SHA109037bb8675c2682a0da3ba275f0287afd1c84a7
SHA2565acad6ee2530651879ed62a6cce54e2230fd0fa4de3208594c955d6b94cdaa51
SHA51286543a166581de4c2df4c8b07e2b7b460b0fa5c6f1661bafc6f82520c919d03ff984d9b98817c2364df8d88c081ea62e5de523208d2eccaf4002393b2252acb7
-
C:\Users\Admin\AppData\Local\Temp\7zSB0D1.tmp\[email protected]\content\zy.xul
Filesize225B
MD579587d3f43171907ccb86c8e908131da
SHA189ccb9c9d0700fb0a5ec4aa2138c328099ec599a
SHA2567835ecb2dbecbe5919e7ea4d29a92b2d1bea1fc27803b8b4574e0d74c8548ac4
SHA512205135af1c913dc71a519e93cdbc4f4bafbc2e785961f54afc93b109bb1af307c434996f3c10c8f214dd78402e60276feeef6610cede7b649f9b8362f32adbc3
-
C:\Users\Admin\AppData\Local\Temp\7zSB0D1.tmp\[email protected]\install.rdf
Filesize702B
MD59c1e6f88806190cde952a9a6f76867ac
SHA1d6b364838759054b54aed2fe6e000c6dc5c1f24f
SHA256a629467fbfc7e14bc03c4b3c7f65290783933200a916812d5354c0dd9c8b9505
SHA5121e141db4dbc4b86cedfacc4d91aa256f34ed57b9030627998064a0dc2aa42f965dcd841f955be25ef6794b0cc4a0894c98a7e98bb2828b06167d9c87aac6ad79
-
Filesize
71KB
MD5b78633fae8aaf5f7e99e9c736f44f9c5
SHA126fc60e29c459891ac0909470ac6c61a1eca1544
SHA256d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA5123885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43
-
Filesize
118KB
MD544f1dc155d3d083b677f20ed0fab8404
SHA1a696c5a0d50145afde3d3a71f70b1c3006ac2199
SHA25667014a6fc8a77ae480dae9b09f800a1f40a40399ef967f86843a80eb4c9eb470
SHA51204a7098abd589eb1a533af6f89d0d982d2faf9c4e7e29d02abaacf81635b789acfb5ca026f7a0c6b4a263934f0425c69f5225488c450e864f8dc8000ffbf94f6
-
Filesize
2KB
MD5c749bca713cf6481411b5c4eaac4506a
SHA1539cb813dea7e37eff8c1b696eb0ab42c815ab62
SHA2560a94d2086eb6ac57ba5ee365d3f6f64f33e7c8d18419f04715460bc04ebddf2d
SHA51211b3b333b97b1bbbbbf01b6d367188698470877e180a3854ec9762f706755156136b404f2b95a7304a890686d8f5f697232e6c28497aca20e0aa76988b0f179a
-
C:\Users\Admin\AppData\Local\Temp\7zSB0D1.tmp\kjjlbdoofhdbhfdgedkjbkfiohpolakj\5102b012ce6bd9.47560392.js
Filesize4KB
MD543388ce3ead3ba8d9e7b32996d80d026
SHA11c28cd133728d4e4fb4d530d1893c719a586e427
SHA25679759083d45b3161468d6439faee53e320df5f7ab12fa6796721f45639d93fea
SHA5123c4fda6c62428e89124d2c158e2ad616b49ba216ef6a5aaa458cc225253852a0e5bfed729508039ce0901161c87f155c8d547e4f0c2d92f869e8fd133076e6f3
-
Filesize
161B
MD584829976f8d6ed1d7e8a03d0ad0ec95f
SHA17be259bdb54afcaaa9afde7776868394a8037620
SHA256a67c9855b36e978b7d37ec4b6d6f975b872ccbed4278adcca22bc8474492271c
SHA5124311d19d3aaece75a581cf56fd600543df2b6981c0a712b9893ad9ad8e38e42572a9f743f75a6de2473f11eb4126e44c6cddcafc6597b9604118bd88573d03f8
-
Filesize
197B
MD55f9891607f65f433b0690bae7088b2c1
SHA1b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA51276018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c
-
Filesize
559B
MD5209b7ae0b6d8c3f9687c979d03b08089
SHA16449f8bff917115eef4e7488fae61942a869200f
SHA256e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA5121b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25
-
Filesize
477B
MD5ded715ef84047d60d612e3ea80e4b6ae
SHA15f2871096c784aacf52e487011b557bdf5532e6e
SHA256638b935da90709cfa4cafec040bc6d3088e808c5f1989ba391b623979a96214a
SHA512d898cd18dbb0d6c1aa1970b17b13011b815e11779a83c9ccb44432110fe04df0685920f3eba43e192dda8b1e924ed0f18552ec0508d9a8907297eb0547410438
-
Filesize
1KB
MD5656a0a0fad9352e28c58bccebacdb9b0
SHA1c8c6f9f6efc2266644e363976c0b77ba81b41aa0
SHA256559f05b2fa728c865684f5a080a6e1a7e47af32dfe02c30337b8166a0641deeb
SHA512c04006217015d348d05cbf8b0656c938419611da96b1dc2021376b53fc9d00754c6d49069c098096079d2d9312b778189c21a1fbc4b9084774b1545884213308
-
Filesize
7KB
MD5721b5f17b4f300307eba801f7a19d7fa
SHA158ae679ad34b36faeacf5c066971788220e49e04
SHA256b474904f220d91c5d35608e8e2edc8513e4804bf1f9d75a599e44ab440001bc7
SHA512e8d41ff800ebe751c0dd7911027a71cbfd0983bdf79552f8bc66ddcce0050e27e0e793fdd436edde850a5e2fde06a015d420838fde7398df110d91c30beec58b
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90