Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 10:33
Behavioral task
behavioral1
Sample
JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe
-
Size
570KB
-
MD5
468c8d2a8812459198c0140b3b0d805c
-
SHA1
a4a26b5ab5b09bdc1c415a057fcf53d9174b789b
-
SHA256
7d6ae029a210650160bf136cef4fd04c5743558a393b6e64316274ac8b0fc9b7
-
SHA512
1add09c07b9e722ea2b26b971b1aec2efb5d81383407bc07db7fdd73fbd713c9b941caa8696c17ae9810e85f59ea6c289bbdd9ece3709e3933f2d7b81ed5f27f
-
SSDEEP
12288:Q/Uj3WbaOzuYM78NW29Uuezee5UpbDK1vPenlYIQHkfNd8/oSGi:K5bxzud8NW2WueSrQ3e4UNd8gi
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 10 IoCs
resource yara_rule behavioral2/memory/4704-52-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/4704-60-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/4704-76-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/4704-171-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/4704-173-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/4704-174-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/4704-177-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/4704-178-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/4704-179-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/4704-183-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\svhost32.exe = "C:\\Users\\Admin\\AppData\\Roaming\\svhost32.exe:*:Enabled:Windows Messanger" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\csrs.exe = "C:\\Users\\Admin\\AppData\\Roaming\\csrs.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe -
Executes dropped EXE 3 IoCs
pid Process 5112 hgpor.exe 1788 csrs.exe 4704 csrs.exe -
Loads dropped DLL 2 IoCs
pid Process 5112 hgpor.exe 5112 hgpor.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrs = "C:\\Users\\Admin\\AppData\\Roaming\\csrs.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1788 set thread context of 4704 1788 csrs.exe 93 -
resource yara_rule behavioral2/memory/724-0-0x0000000000400000-0x00000000007DC000-memory.dmp upx behavioral2/files/0x000c000000023bf2-30.dat upx behavioral2/memory/1788-42-0x0000000000400000-0x00000000007DC000-memory.dmp upx behavioral2/memory/724-44-0x0000000000400000-0x00000000007DC000-memory.dmp upx behavioral2/memory/4704-47-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4704-52-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4704-50-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/1788-57-0x0000000000400000-0x00000000007DC000-memory.dmp upx behavioral2/memory/4704-60-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4704-76-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4704-171-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4704-173-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4704-174-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4704-177-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4704-178-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4704-179-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4704-183-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Tracker Checker 2\Tracker Checker 2.exe hgpor.exe File created C:\Program Files (x86)\Tracker Checker 2\trackers.xml hgpor.exe File created C:\Program Files (x86)\Tracker Checker 2\Uninstall.exe hgpor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hgpor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x000d000000023bca-7.dat nsis_installer_1 -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1872 reg.exe 1292 reg.exe 3032 reg.exe 416 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 4704 csrs.exe Token: SeCreateTokenPrivilege 4704 csrs.exe Token: SeAssignPrimaryTokenPrivilege 4704 csrs.exe Token: SeLockMemoryPrivilege 4704 csrs.exe Token: SeIncreaseQuotaPrivilege 4704 csrs.exe Token: SeMachineAccountPrivilege 4704 csrs.exe Token: SeTcbPrivilege 4704 csrs.exe Token: SeSecurityPrivilege 4704 csrs.exe Token: SeTakeOwnershipPrivilege 4704 csrs.exe Token: SeLoadDriverPrivilege 4704 csrs.exe Token: SeSystemProfilePrivilege 4704 csrs.exe Token: SeSystemtimePrivilege 4704 csrs.exe Token: SeProfSingleProcessPrivilege 4704 csrs.exe Token: SeIncBasePriorityPrivilege 4704 csrs.exe Token: SeCreatePagefilePrivilege 4704 csrs.exe Token: SeCreatePermanentPrivilege 4704 csrs.exe Token: SeBackupPrivilege 4704 csrs.exe Token: SeRestorePrivilege 4704 csrs.exe Token: SeShutdownPrivilege 4704 csrs.exe Token: SeDebugPrivilege 4704 csrs.exe Token: SeAuditPrivilege 4704 csrs.exe Token: SeSystemEnvironmentPrivilege 4704 csrs.exe Token: SeChangeNotifyPrivilege 4704 csrs.exe Token: SeRemoteShutdownPrivilege 4704 csrs.exe Token: SeUndockPrivilege 4704 csrs.exe Token: SeSyncAgentPrivilege 4704 csrs.exe Token: SeEnableDelegationPrivilege 4704 csrs.exe Token: SeManageVolumePrivilege 4704 csrs.exe Token: SeImpersonatePrivilege 4704 csrs.exe Token: SeCreateGlobalPrivilege 4704 csrs.exe Token: 31 4704 csrs.exe Token: 32 4704 csrs.exe Token: 33 4704 csrs.exe Token: 34 4704 csrs.exe Token: 35 4704 csrs.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 724 JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe 1788 csrs.exe 4704 csrs.exe 4704 csrs.exe 4704 csrs.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 724 wrote to memory of 5112 724 JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe 87 PID 724 wrote to memory of 5112 724 JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe 87 PID 724 wrote to memory of 5112 724 JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe 87 PID 724 wrote to memory of 1468 724 JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe 89 PID 724 wrote to memory of 1468 724 JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe 89 PID 724 wrote to memory of 1468 724 JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe 89 PID 1468 wrote to memory of 4460 1468 cmd.exe 91 PID 1468 wrote to memory of 4460 1468 cmd.exe 91 PID 1468 wrote to memory of 4460 1468 cmd.exe 91 PID 724 wrote to memory of 1788 724 JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe 92 PID 724 wrote to memory of 1788 724 JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe 92 PID 724 wrote to memory of 1788 724 JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe 92 PID 1788 wrote to memory of 4704 1788 csrs.exe 93 PID 1788 wrote to memory of 4704 1788 csrs.exe 93 PID 1788 wrote to memory of 4704 1788 csrs.exe 93 PID 1788 wrote to memory of 4704 1788 csrs.exe 93 PID 1788 wrote to memory of 4704 1788 csrs.exe 93 PID 1788 wrote to memory of 4704 1788 csrs.exe 93 PID 1788 wrote to memory of 4704 1788 csrs.exe 93 PID 1788 wrote to memory of 4704 1788 csrs.exe 93 PID 4704 wrote to memory of 216 4704 csrs.exe 94 PID 4704 wrote to memory of 216 4704 csrs.exe 94 PID 4704 wrote to memory of 216 4704 csrs.exe 94 PID 4704 wrote to memory of 220 4704 csrs.exe 95 PID 4704 wrote to memory of 220 4704 csrs.exe 95 PID 4704 wrote to memory of 220 4704 csrs.exe 95 PID 4704 wrote to memory of 380 4704 csrs.exe 96 PID 4704 wrote to memory of 380 4704 csrs.exe 96 PID 4704 wrote to memory of 380 4704 csrs.exe 96 PID 4704 wrote to memory of 408 4704 csrs.exe 97 PID 4704 wrote to memory of 408 4704 csrs.exe 97 PID 4704 wrote to memory of 408 4704 csrs.exe 97 PID 216 wrote to memory of 3032 216 cmd.exe 102 PID 216 wrote to memory of 3032 216 cmd.exe 102 PID 216 wrote to memory of 3032 216 cmd.exe 102 PID 408 wrote to memory of 1292 408 cmd.exe 103 PID 408 wrote to memory of 1292 408 cmd.exe 103 PID 408 wrote to memory of 1292 408 cmd.exe 103 PID 380 wrote to memory of 1872 380 cmd.exe 104 PID 380 wrote to memory of 1872 380 cmd.exe 104 PID 380 wrote to memory of 1872 380 cmd.exe 104 PID 220 wrote to memory of 416 220 cmd.exe 105 PID 220 wrote to memory of 416 220 cmd.exe 105 PID 220 wrote to memory of 416 220 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_468c8d2a8812459198c0140b3b0d805c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\hgpor.exe"C:\Users\Admin\AppData\Local\Temp\hgpor.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:5112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SNMHG.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "csrs" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\csrs.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4460
-
-
-
C:\Users\Admin\AppData\Roaming\csrs.exe"C:\Users\Admin\AppData\Roaming\csrs.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Roaming\csrs.exeC:\Users\Admin\AppData\Roaming\csrs.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3032
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\csrs.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\csrs.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\csrs.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\csrs.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:416
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svhost32.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svhost32.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svhost32.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svhost32.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1292
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130B
MD534a635bb69f9dc2d8e8ceba2f6b25308
SHA166bbd6b4eb975af0a799c6be7aaed6917f5df10c
SHA256eb18b0e443ffb00db0eb4438c0d3ec49cf67c3b7cbc9da8e25c60298c970a59a
SHA512ae355a265391afe02a37d82ffb0df6664788dc4aee975678aeb524ff47f889d1e5ecab42b073093d71494c9868276dc9794d4bebce4c967d866b189c136a9545
-
Filesize
134KB
MD50886cebbac590d40e9d58149deaff91b
SHA1c1e4c70ea6a191112944668c7051c4e06346358d
SHA2563b67b34b7e8b15662f091bcc8ce44cbfee54ea7405ab2dc55c7440c722cc4862
SHA51265b5f489bb1b43b70fee0f0a91436296c14090d22ae0df0565750bc43afba437b4123b2c239cfae6a86c679fc907aeb5ffa0809ca49640862bcd811a9bac9ad5
-
Filesize
14KB
MD5296a5f3179fa8d7a7a855eaf696ede44
SHA157aa5b71553ed282dd22c768e039a187f5c13f63
SHA256ee0ad77e681c4d0fdf1d67df5f4ca03e6bdd8e3b05dfb47a83ad5c733ed62960
SHA512bc527d1485f468e8d098057e0e38e8cb7aa6eb64d4ca30927b99b1552a3177b132b989015ff95bdf2ca046bf11a54b4b456f51e024fbc734fbb548c3499e53f6
-
Filesize
10KB
MD586b5a07a43b7cbc5c49263b8d974b736
SHA178388286a311810d812c13d87dea12d581713e60
SHA2565897fb00be38e502fb5dfd047d97e5e4da6387a7a6259633dc31c2427612901b
SHA512dcbe379c28302bb3472339cd24949b16548fa0003882a920df6839078cc7b2563f058a0524bf25df0a5ec8b08e302ebc9e646033109958669d8af883af959ffe
-
Filesize
588B
MD5355dce16ee49d8e6580b83dc15251375
SHA1354e1837ccae8add87361d970f750fca9bd76ee0
SHA2564c662eaf98953df0955bdd89117114bc41765238d3255bf453e12a7074bdc43a
SHA512fd2b1db2c170054ede5aa12a4482755ed538a72fa8e9313e0007d99c82e4e0b0edf76caf11137ba2ecddb17ef9b2f011002d9b48f3f3a199eeadb51b5e22919b
-
Filesize
609B
MD58907bd083340a26eb61799f26377708a
SHA1fd3f478a6e3dbfd42d3e4b6f683343dea0bd884b
SHA256833a7059f1182c9c5f068ae234017176ea7f5ba24dc2cad771212250b7168ac7
SHA512b832a5fa55e78be5340fb6f134ea10644182e9778eb03ce26cbe6713b55bbb2f98482117f5f8a05e606811f03f277c50207fa5c3ffb668058d33295f755eb8ce
-
Filesize
570KB
MD581c892646354f1d3ca78476b57e63773
SHA1e141ff35da30039fd54dd292957104a158042283
SHA256a4dd1262a4e3946b26d0c03a7677e1e75cd5dd793931e1ec026091fd9409906a
SHA512e3925f92d396de56948cdacd80590dfe7dd0bf5ea7904af81ae5b8082e5f81f63eb0c5f10cc44ded66f0c981e8fafd414447508c2c70732f81be8ff04b9d9352