Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
403b28a97274b8456c3af994abda96a7_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
403b28a97274b8456c3af994abda96a7_JaffaCakes118.exe
-
Size
253KB
-
MD5
403b28a97274b8456c3af994abda96a7
-
SHA1
d55eac30ef0bd979fc84584bdb57fae6799b6e5e
-
SHA256
0e6f1727dd0afcce822e676739dcee4d04e87fbeaf628c502b616b575d302859
-
SHA512
46e7d4c267a26483b42295d94944b15fd63a82aa1d4107e750463d5a818d3b476b8fa6e998735a6865cd971d3d1215605050941b0912720a2e212dac90f979b7
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5/MfQvFg6tJvSsTE0rb:h1OgLdaOUqFg6LvNTE0/
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000023c06-69.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1212 51a8ced8cf613.exe -
Loads dropped DLL 3 IoCs
pid Process 1212 51a8ced8cf613.exe 1212 51a8ced8cf613.exe 1212 51a8ced8cf613.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\kpblojebhcjggbdcmchlaionnapdpkkm\1\manifest.json 51a8ced8cf613.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7E321DA2-F96E-F1E9-79AD-3D143365058A}\NoExplorer = "1" 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7E321DA2-F96E-F1E9-79AD-3D143365058A} 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7E321DA2-F96E-F1E9-79AD-3D143365058A}\ = "conTinuEtosaavee" 51a8ced8cf613.exe -
resource yara_rule behavioral2/files/0x0008000000023c06-69.dat upx behavioral2/memory/1212-73-0x0000000074180000-0x000000007418A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 403b28a97274b8456c3af994abda96a7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51a8ced8cf613.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x000a000000023b9e-29.dat nsis_installer_1 behavioral2/files/0x000a000000023b9e-29.dat nsis_installer_2 behavioral2/files/0x0008000000023c22-98.dat nsis_installer_1 behavioral2/files/0x0008000000023c22-98.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7E321DA2-F96E-F1E9-79AD-3D143365058A}\ = "conTinuEtosaavee" 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\conTinuEtosaavee\\51a8ced8cf64b.tlb" 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\conTinuEtosaavee" 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{7E321DA2-F96E-F1E9-79AD-3D143365058A}\InProcServer32 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{7E321DA2-F96E-F1E9-79AD-3D143365058A}\ProgID 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7E321DA2-F96E-F1E9-79AD-3D143365058A}\InProcServer32\ = "C:\\ProgramData\\conTinuEtosaavee\\51a8ced8cf64b.dll" 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{7E321DA2-F96E-F1E9-79AD-3D143365058A} 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7E321DA2-F96E-F1E9-79AD-3D143365058A}\InProcServer32\ThreadingModel = "Apartment" 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7E321DA2-F96E-F1E9-79AD-3D143365058A}\ProgID\ = "conTinuEtosaavee.1" 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 51a8ced8cf613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 51a8ced8cf613.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3444 wrote to memory of 1212 3444 403b28a97274b8456c3af994abda96a7_JaffaCakes118.exe 86 PID 3444 wrote to memory of 1212 3444 403b28a97274b8456c3af994abda96a7_JaffaCakes118.exe 86 PID 3444 wrote to memory of 1212 3444 403b28a97274b8456c3af994abda96a7_JaffaCakes118.exe 86 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 51a8ced8cf613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{7E321DA2-F96E-F1E9-79AD-3D143365058A} = "1" 51a8ced8cf613.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\403b28a97274b8456c3af994abda96a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\403b28a97274b8456c3af994abda96a7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\51a8ced8cf613.exe.\51a8ced8cf613.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
- System policy modification
PID:1212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5f3c79bda3fdf7c5dd24d60400a57cadb
SHA11adb606aaeedb246a371c8877c737f0f8c798625
SHA256a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935
-
Filesize
71KB
MD5b78633fae8aaf5f7e99e9c736f44f9c5
SHA126fc60e29c459891ac0909470ac6c61a1eca1544
SHA256d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA5123885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43
-
Filesize
109KB
MD50e39b69f32aafde9527e88beabef66af
SHA16c5f221b49ad2693d21ee0528fe6286a410d7517
SHA2561c4ba81c723f896ae542e6e55e76cd1062c50b82505b50b91f7d756bae8ec607
SHA51233ca5f5fe377bc0cbd35592445bf771dab1315a3fc34b73ce961f94db42b269c94ca1bf06f1c2434278f4872445363fdaa016ecf8b60c74fb00230e9961b9165
-
Filesize
18KB
MD55c4616e4ea60383a9900d27030cd7cd4
SHA1ef116081b72c995e1240e2b381bdae3e21a1e2ff
SHA256ff4cea2b1584b8e3f274afcc77fc3421dfea1dfef8c43c495449524bdacf1c6a
SHA512740ffc33441c588624317a9d5b414380e826ff9a637a7260f3e5dec7e3615595e9874c7361a5cd4e08386419121e236155e8b4e81796eabd0eaa97b02aaf1e16
-
C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\kpblojebhcjggbdcmchlaionnapdpkkm\51a8ced8cf4290.30186951.js
Filesize4KB
MD5cbf01d5e703788cf0390aa1e4ae13b6d
SHA1539f9b10c20a61cf512dc7637416c1ea5d527b78
SHA256eb6a62082c513e40d6c8e02430c491e2376a0cc3d4d1c6093111fa8353996169
SHA512f41b098fa589c08b040c38cf5ee4286bb861a794fe325e72ea28a6e779eab4da9c2cb5622a2bc6942800a4edc7b48cc896b7f8b35ca6ce34f06d1430c21d8900
-
Filesize
161B
MD52b16687044ec9f3c7b4a5ee2005bb1a4
SHA11850a07ca3790abefc2785a9862321692337fc9c
SHA256c338918074d0d38f33dc228954b3f5e3226d25f578071c1404642513a1fbaada
SHA512a85c0ccdf4d8421a876e7b1c61bec1ba9706c84d66719fe512feb87c59af3747e7b40675019ef8643e1ded4ade9da3732826a33691323753716bdc49c3d0f65b
-
Filesize
197B
MD55f9891607f65f433b0690bae7088b2c1
SHA1b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA51276018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c
-
Filesize
559B
MD5209b7ae0b6d8c3f9687c979d03b08089
SHA16449f8bff917115eef4e7488fae61942a869200f
SHA256e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA5121b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25
-
Filesize
508B
MD5a7174d7c9158b5f7f330cf2916a639ae
SHA1f7246dd07dd4598797fd13cdffe4dfe56d572b77
SHA256cd184246185c663e155f8198d9aef9f78468131e3fda18dea5528b2e9e48bd86
SHA51296c16dafa55c6176d5bfa29f95d43ecad13ba53a2a450669c44dc0a6628503500532a739bac0cb25498b75e593059babf0cbfc1d1df8c6f4d0e4142c97361bb3
-
Filesize
1KB
MD506297423b04e9a74b02a9e57789286bb
SHA1604d4f590e6db4f2b0ff7309a7e54b5955417565
SHA2561b4465cd700b44f3353b0a4c17ffe6f041712737ea3451c695f6119caa99b3c0
SHA512162c65eaac84d50c03c4359247201fc0b935c6088c24308f4eb121a4751e63db994876a937e6f5184b97a820067013391347bf19baa1dfdb5739583e3456688c
-
Filesize
7KB
MD541ac81b34cbd42bf27bed2d57cec0ebf
SHA1a0fd5f9b05fe58629d74eeac664016c630cc0c43
SHA256fa3000f949673223fad2262f432033c718db0275b6ad7ebbb164c96f32197711
SHA51285a2a51c1e9d6e4702659b9b5a7e8f79920c5b090472c41c2b631cce381077dc0b2bdbd7447b5f8b2f3dac4bfcf577ada37983bb9a0ae0d80d5a2b09188f9cf5
-
C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5593940dd24b6dc43f85169b1b7eb6c07
SHA16c8357f2f2800b6adf37d364a4b1279d95145a43
SHA2562daa650461213cbe8e6135b926b5d673ab0724616ccf09688fb913c413296258
SHA5121ec74353f11a444f79a19734602ea449c94482d83ed3fb0f40af5dfd275a66a0aeb701f2e63bcc6d410c24c6438794cf80ea31b58c2cd1ce9e33d9a7fc7eda85
-
C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\[email protected]\chrome.manifest
Filesize116B
MD5b0403bcb70b2feef649e3b480524c113
SHA1963a7ec562fb8ba8cccd29055a4e4aa3df33cf40
SHA25613daaed6d2e9cbb1d1202651151c8178e06f065a7e24a43665c8e3ae2c85c7b1
SHA512e9918a0c189ea7c2a21ad736ad09eb5659d3ae7be34257adcc579f85b13bac2669592c8ec7bcb74e939b201bc489ab981a2ccb25e7244ff48775de3e1b8d90d8
-
C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\[email protected]\content\bg.js
Filesize8KB
MD559b43da84e3375d2fdf2a159bd4e452d
SHA1244d49243e84e5b30c1c26a10b2d9701f45ed0a3
SHA25677208316be47c770359f5300c72c07e1d6c45fdf301551eca9aa3ccb7b78ce83
SHA512e70d1e88e157a837d84da034a6b886c4f60681739422ce87658a50670788116861151f56e82ef3245b368730b5327db60c48ac93d38a92459e44e65491c031af
-
C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\[email protected]\install.rdf
Filesize608B
MD54da544b2f19125f90a3813c781de3e2f
SHA1af8b32220eb3fba46e52a5d35704b75204a7841c
SHA25662f3eed1b71bafcc7542f65e79f75a30357b42f9f4dea177b80eab44125ff79f
SHA512c59a159fe7c0481ba6b47fbe890c84e3b24edb1004c281313bd72f2ad29ca975bc22b8becc02e757be9b63497071d04a333008742881b71532edb97c20697dc7
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90