Resubmissions
28/03/2025, 15:25
250328-stnacszlw6 7Analysis
-
max time kernel
104s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8acd559c727fbd2d5aaca742c217fa61.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8acd559c727fbd2d5aaca742c217fa61.exe
-
Size
255KB
-
MD5
8acd559c727fbd2d5aaca742c217fa61
-
SHA1
87a55fa503c2057a084572b8d0a6675309258306
-
SHA256
18f195909f319c3da5103254f6c54c3ceba19852a36f429d6e5d4374a5bd3b67
-
SHA512
13f3629344b0db01bd89c8f8e59dd5ac0bf7fa473f3ecc91761f7d5f0e548c38c65ce929b00034d73d8286c4049f034a14a726ecaa8511fa5198c9c0c1ab005a
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5eBgD024XdgqbeHgOm:h1OgLdaOedX8HgH
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00070000000242ea-74.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2924 5124892fcc784.exe -
Loads dropped DLL 3 IoCs
pid Process 2924 5124892fcc784.exe 2924 5124892fcc784.exe 2924 5124892fcc784.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\fgcgpchihjlhpodnmejfilijbcgalpnd\1\manifest.json 5124892fcc784.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E2DBD306-2AA3-C9DF-1EFC-91925D0577B0} 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E2DBD306-2AA3-C9DF-1EFC-91925D0577B0}\ = "MagniPic" 5124892fcc784.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E2DBD306-2AA3-C9DF-1EFC-91925D0577B0}\NoExplorer = "1" 5124892fcc784.exe -
resource yara_rule behavioral2/files/0x00070000000242ea-74.dat upx behavioral2/memory/2924-77-0x0000000074B70000-0x0000000074B7A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8acd559c727fbd2d5aaca742c217fa61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5124892fcc784.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x00070000000242d0-31.dat nsis_installer_1 behavioral2/files/0x00070000000242d0-31.dat nsis_installer_2 behavioral2/files/0x00070000000242ee-103.dat nsis_installer_1 behavioral2/files/0x00070000000242ee-103.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 5124892fcc784.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{E2DBD306-2AA3-C9DF-1EFC-91925D0577B0} 5124892fcc784.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{E2DBD306-2AA3-C9DF-1EFC-91925D0577B0}\InProcServer32 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 5124892fcc784.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{E2DBD306-2AA3-C9DF-1EFC-91925D0577B0}\ProgID 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E2DBD306-2AA3-C9DF-1EFC-91925D0577B0}\InProcServer32\ThreadingModel = "Apartment" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\MagniPic\\5124892fcc7bd.tlb" 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\MagniPic" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E2DBD306-2AA3-C9DF-1EFC-91925D0577B0}\ = "MagniPic" 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E2DBD306-2AA3-C9DF-1EFC-91925D0577B0}\InProcServer32\ = "C:\\ProgramData\\MagniPic\\5124892fcc7bd.dll" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E2DBD306-2AA3-C9DF-1EFC-91925D0577B0}\ProgID\ = "MagniPic.1" 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 5124892fcc784.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 5124892fcc784.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2924 2308 JaffaCakes118_8acd559c727fbd2d5aaca742c217fa61.exe 86 PID 2308 wrote to memory of 2924 2308 JaffaCakes118_8acd559c727fbd2d5aaca742c217fa61.exe 86 PID 2308 wrote to memory of 2924 2308 JaffaCakes118_8acd559c727fbd2d5aaca742c217fa61.exe 86 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 5124892fcc784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{E2DBD306-2AA3-C9DF-1EFC-91925D0577B0} = "1" 5124892fcc784.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8acd559c727fbd2d5aaca742c217fa61.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8acd559c727fbd2d5aaca742c217fa61.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\7zS7D7D.tmp\5124892fcc784.exe.\5124892fcc784.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
- System policy modification
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5f3c79bda3fdf7c5dd24d60400a57cadb
SHA11adb606aaeedb246a371c8877c737f0f8c798625
SHA256a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935
-
C:\Users\Admin\AppData\Local\Temp\7zS7D7D.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5b7d1ebde0a9a03536abedc9dcd58f770
SHA1651dff4a862399d3dc6eaebcde554d7113d9c377
SHA2560cd2bb7a7dcbb63d111784729bec3ff2517ee1f3edc89e0235289f77d545b29d
SHA5125ce2a12a670195569f46318e59788401962e0fcc7b5651505a5e068dd517156d59ac338b098b597ce727e68d57b60be3dc0c7dc067376205965a63423450d341
-
C:\Users\Admin\AppData\Local\Temp\7zS7D7D.tmp\[email protected]\chrome.manifest
Filesize116B
MD5d7f4e0b383b64d214be3539de15921f0
SHA1525a491733d655d8a032546deca54a92f5f87fdd
SHA256fbc7eabc530565b00c5a31ea70fb9484fcb3d50fa57974cffef194730bcf8020
SHA512f2d917a84248c7d81be889b774d461d3605239d1bc8189fd5454c7f319a34002f750e884f4b2b73e97e494eba6ba968e60ca4970565191c00f59f48a16882cc2
-
C:\Users\Admin\AppData\Local\Temp\7zS7D7D.tmp\[email protected]\content\bg.js
Filesize8KB
MD55cedd11b5f866edc9022f2e669f9c958
SHA1c5a6e0f7902b0b8dce254a62f8192104361053d1
SHA25645433f7174f912d8e125e9955736d259389763c79b23912b79d910cfe2de837d
SHA512e679d3263e21afbce5cf578de540659b7280a0842014ba82a7dc719014917525be6dc754b33a5f7410b6e7626c524b6fb936aa2ada0fbab439ef35adc494d159
-
C:\Users\Admin\AppData\Local\Temp\7zS7D7D.tmp\[email protected]\content\zy.xul
Filesize225B
MD55d8d2415c550735f78e8e3b6d9fa92b5
SHA18f69457872d6b3d57c00acdc4c27a8f5b70db4cc
SHA25643e2558eea8dccca16235e120f5487c96c8aa3fa20a702fb702ad46234388c65
SHA5126f378dc47cac635972d6f54981e5bd099022e0e7c47715acb395723376b306566a341d0b82400b2457a71885ee5c876ec314400bf76065593e26e974e7b9583a
-
C:\Users\Admin\AppData\Local\Temp\7zS7D7D.tmp\[email protected]\install.rdf
Filesize708B
MD5c2e761a814d4bc718d1d118af6486f87
SHA17c25e28d506d645576d3bfcec11091147a6657d5
SHA25682c413b787786812aff971f5258a93b30ea2174cf08cd2aaad8eb8acaf7a6b04
SHA51284aba46e5240175db405b67ead6cf0733f3a1e358c2581104ef5202fa009ed91c69b4f72dd0e8a3cef68113f71e303472d2f2f38443ca743b9ea97457f063bb2
-
Filesize
71KB
MD5b78633fae8aaf5f7e99e9c736f44f9c5
SHA126fc60e29c459891ac0909470ac6c61a1eca1544
SHA256d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA5123885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43
-
Filesize
115KB
MD500ce3831a16a62c6d7ea4b21049e4b22
SHA13e48c8d25b196d67722ed20cd36bf3448a4c9136
SHA256d4bb7937b36973cbf3b12c9500c25ed34103944a69bad9162f3b98f39474529c
SHA5127633071b26d802aae1250111baa40e5158fb1a1639d76098f2ecd6263adf0e6371d5e9a70d9005b267cb907da84235f4e361f8c8a75b8adbd19a049ab1227619
-
Filesize
18KB
MD5d5980ff8eb0ef4276fad96fba8fc5018
SHA12cb05f8b43aa3ae2f5492f590997eec6ff808fe2
SHA256ac3a1daa32b1c489f9c2f4413ab35c4fc90b54a52ede0fb53276666e6eeef16f
SHA51230404f467dd727a7de132fb08cd3c88abf5fb2e7ef18f24af5371b63fd106d6d5757061ec55c7b54daf9844100280670bf2b22a71c89b160048552b5eec12d0c
-
C:\Users\Admin\AppData\Local\Temp\7zS7D7D.tmp\fgcgpchihjlhpodnmejfilijbcgalpnd\5124892fcc5b13.60534333.js
Filesize4KB
MD5341bfb47e1ef44f64b8b1b362b279c62
SHA11fdc56505743a0229eeee9b202eff3d625f940df
SHA256f44163ac88b8a753b0f4254f01489b3150553eaf785dc6378e6383b574ca012a
SHA512b1fcc699e277f41a1c35b8ea77e1b6b8dbbb1a4c40bce9cff0b8cfdcd48c3d12f755fc50d860fb17287a94a8056fc4095d160575468c7f36c9872357b3694f60
-
Filesize
161B
MD533231c7713d59a41ae5ac2bd0df567ea
SHA1ddecbc03dd5c7a90037f640c89183dea2e61a0b5
SHA2562b1b903fc14b833a764de366e1d8be889c57758bc41f0cf4106ef4453ec6f034
SHA5123c9d3bdfe729249e2e7597ff566a33ff7794e53a3c19f17ffc06429f9343d75a7874caf832b42f5065e3d9f3f35129478e28c42c7dc0f63baf83e61801809cff
-
Filesize
197B
MD55f9891607f65f433b0690bae7088b2c1
SHA1b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA51276018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c
-
Filesize
559B
MD5209b7ae0b6d8c3f9687c979d03b08089
SHA16449f8bff917115eef4e7488fae61942a869200f
SHA256e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA5121b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25
-
Filesize
500B
MD5a0f5216f9ef73821b099af3440767908
SHA1afd928d41924b07d9081313643ceada5020ba77f
SHA256596e4d155f4be2ea3017a70b983874f9e8622690bdfbe94cc5588f334972a023
SHA512a62378579e821bc573a333156e685a3a368c8631cb269944428594a849891b4d77518a76d2e357f3cd9a207e96d0fa6e36de25f5a240f8a5d73b293d38d4549b
-
Filesize
1KB
MD5f75bb2f81b86af24616968f4f2b4a7d6
SHA1c5e4a915e281cf5d35efc7372d7c0ad77daf2d5e
SHA2565cfedcb35720cc1b3607969fc032b8f8ca54c8abbdae48ab0d42b93843a88ecf
SHA512d7a7c7c29ac3fc735da2a2018f26cc5261f66465a8703d4363cd9f1c9248389c134a316895feaec141c1372f749598a47c7cc2f8e66b75f9d70aedf4cf608974
-
Filesize
6KB
MD58f3cd6d5134a5d7afa99e10d2a2bae16
SHA1913c1382effcd06abd72816ff33008267848348a
SHA256b6980435c1443e63534b6825fd56ed27ac1ff9fab92da50d8084c62205af0b08
SHA512018c0091fe7a06ecc47354e10c57c1794b1fba5434d4ec580ceebb3e57a45c40a8cd24ee61e78251be13f3b8a61a07fc7aaa7fbc8c30b03ee88ff2e5004e893f
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90