Analysis
-
max time kernel
106s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8ae4fc85d902009beebac57b52e784cf.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_8ae4fc85d902009beebac57b52e784cf.exe
-
Size
255KB
-
MD5
8ae4fc85d902009beebac57b52e784cf
-
SHA1
48d6852775db8aa62f6cf37b44bc09eec0b5f5a2
-
SHA256
6288bef4ba78b121fdf6c86b0b87b8f69402f6361a026d3b66ed0e5baa9f012d
-
SHA512
cb7658d700899d9c46c35bcea627b2a8c61ee803e6af48b8c5f1f7c00cadfe128fbc2530a7c649058bf1e19a52d1f0c4eb11617574b5f5e5dfb6e49cc3a506af
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5GM3torRY9mrWJY8oYlx1608Jgt:h1OgLdaOGMYWJY8Tx1V8Gt
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000024247-69.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 4712 51824cd72b39e.exe -
Loads dropped DLL 3 IoCs
pid Process 4712 51824cd72b39e.exe 4712 51824cd72b39e.exe 4712 51824cd72b39e.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mpoagenmnmpdganbcibgdefgfihgeneg\1\manifest.json 51824cd72b39e.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5082FFD1-7712-B412-C0E6-36ADCD87BEB0} 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5082FFD1-7712-B412-C0E6-36ADCD87BEB0}\ = "Brouwse2save" 51824cd72b39e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5082FFD1-7712-B412-C0E6-36ADCD87BEB0}\NoExplorer = "1" 51824cd72b39e.exe -
resource yara_rule behavioral2/memory/4712-72-0x0000000074310000-0x000000007431A000-memory.dmp upx behavioral2/files/0x0007000000024247-69.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8ae4fc85d902009beebac57b52e784cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51824cd72b39e.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x000700000002422f-29.dat nsis_installer_1 behavioral2/files/0x000700000002422f-29.dat nsis_installer_2 behavioral2/files/0x000700000002424b-98.dat nsis_installer_1 behavioral2/files/0x000700000002424b-98.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5082FFD1-7712-B412-C0E6-36ADCD87BEB0}\InProcServer32\ = "C:\\ProgramData\\Brouwse2save\\51824cd72b3d5.dll" 51824cd72b39e.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{5082FFD1-7712-B412-C0E6-36ADCD87BEB0}\ProgID 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Brouwse2save" 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 51824cd72b39e.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{5082FFD1-7712-B412-C0E6-36ADCD87BEB0} 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5082FFD1-7712-B412-C0E6-36ADCD87BEB0}\ = "Brouwse2save" 51824cd72b39e.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{5082FFD1-7712-B412-C0E6-36ADCD87BEB0}\InProcServer32 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5082FFD1-7712-B412-C0E6-36ADCD87BEB0}\InProcServer32\ThreadingModel = "Apartment" 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5082FFD1-7712-B412-C0E6-36ADCD87BEB0}\ProgID\ = "Brouwse2save.1" 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Brouwse2save\\51824cd72b3d5.tlb" 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 51824cd72b39e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51824cd72b39e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1592 wrote to memory of 4712 1592 JaffaCakes118_8ae4fc85d902009beebac57b52e784cf.exe 86 PID 1592 wrote to memory of 4712 1592 JaffaCakes118_8ae4fc85d902009beebac57b52e784cf.exe 86 PID 1592 wrote to memory of 4712 1592 JaffaCakes118_8ae4fc85d902009beebac57b52e784cf.exe 86 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 51824cd72b39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{5082FFD1-7712-B412-C0E6-36ADCD87BEB0} = "1" 51824cd72b39e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ae4fc85d902009beebac57b52e784cf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ae4fc85d902009beebac57b52e784cf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\7zS9F0F.tmp\51824cd72b39e.exe.\51824cd72b39e.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
- System policy modification
PID:4712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5f3c79bda3fdf7c5dd24d60400a57cadb
SHA11adb606aaeedb246a371c8877c737f0f8c798625
SHA256a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935
-
Filesize
71KB
MD5b78633fae8aaf5f7e99e9c736f44f9c5
SHA126fc60e29c459891ac0909470ac6c61a1eca1544
SHA256d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA5123885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43
-
Filesize
115KB
MD5000cf99d5e93b57e2ec5aa467244fef9
SHA15356cdc3811ef26cb671b3f6614634458d778ce9
SHA2562fb11adc4496ecc8543b34b1dba3312444eb9e77a2bd4eaf42e376f3e0b87de9
SHA512c75c1844919ab9d589cb5214e19d05967c8ed62565b4dedb999d4b3c216c6ef165b64d9f57c3996895f1c8c601fe62a37cf5912c534d5f6ca921dbf0cee064fa
-
Filesize
18KB
MD5b8d31af5eeace49ff1e44abb53abf9af
SHA159fb16dbe60a460af8b47662436f63eec36de95a
SHA256c4b27e38a0c172d87dd2c20959ab37469c7ec2432da9508f34ef57e808982393
SHA512fb56c102ea4002650394307f025d21f446061e4cc29249f1decf3eec2efeb40f9a912cfa8dfc56b6f80cab9cfb57233c674947c3bd11326ebe7abecd2fa82bfe
-
C:\Users\Admin\AppData\Local\Temp\7zS9F0F.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5ae475bb368286bbf569f93609789ef63
SHA1eb1048b633eb03b0e13535c683df9872d75b0f34
SHA256c3153e34b247e979efeb9ab0573df3625f4b0bbc03c35cbc4ba4a9682dfdb050
SHA5126db5103b9f9c59698934fa2538ddf2717824ad84def37954ecf23d5247d681011fcff67bd9371ac69adc6387e5d9ef8af208ce74a7051d855766a3f3ba0e1c3b
-
C:\Users\Admin\AppData\Local\Temp\7zS9F0F.tmp\[email protected]\chrome.manifest
Filesize116B
MD5739b8d5d073b1b99204275f8725cd125
SHA1fbb2bd941b4c9736231f683cc50c0de38b49f0e2
SHA2565271908acccd5bd7e523bcb63b1fc2ebd8527c49d4be85619c71077949aaa7d1
SHA5122184a86856789d5f0557e6df08546d5eb044fccd876ac021ba545fb9b2f0da39e49e92091f6ec3699b92f57f54f67418387e62fb1ce6eeac8c21d834a1fc5a1f
-
C:\Users\Admin\AppData\Local\Temp\7zS9F0F.tmp\[email protected]\content\bg.js
Filesize8KB
MD5d0af47179803b617f6a5cc2b2f7e2842
SHA1c1814ee96eb880f42af05db6bf94a2da7d9e81bd
SHA256527b5f6ff5684a04d618049821ef75fa342c44b9e64a564797d3dc68a00f0699
SHA512d540cc46c2e4ebfc781351222753027066730ed55b360b0cf60037ac430778bc5cd66ab4e8fa8082f57000063fb17c8513e106fda850114b0bc005499c0cca53
-
C:\Users\Admin\AppData\Local\Temp\7zS9F0F.tmp\[email protected]\install.rdf
Filesize605B
MD57b0edcb04eb57da141ef950b52e57822
SHA1661cee1153e3d26854838e823956fe973aa3504f
SHA256acd7c4450b440bb61dee5f77e42afe85fa6c9f424f0caae161e5c079aebf26c2
SHA512e708b3dad35e21aef9ef5bd81d973e4429a20c0a31fd96b98db129b96d294dc3a593e0d9bd1d1b8b3ebd0a6c0b79bd98ce3673efebf2514b56c6d33747c9c819
-
C:\Users\Admin\AppData\Local\Temp\7zS9F0F.tmp\mpoagenmnmpdganbcibgdefgfihgeneg\51824cd72b1cf3.72933550.js
Filesize4KB
MD59b20963c0332299593ebf5dea6b49d6e
SHA18263c5a72e8c6c443fb5bfbdd1afc39954f3985c
SHA256066f9d348bb36bd306aa2fabb4c62cbf932043928999a4693899fdf057ee415d
SHA512c404cb55b5609ff826054b0be9f7e3995c5802e98c5906f0e385c6eabf8e2df81f1a415e3887917f2b27d8d4cd40d762ac05986ad4e96307af722a6ccd8e72ff
-
Filesize
161B
MD561878be54ea7b0b9fd9469a1c5f3f3bd
SHA174d8717846bc6af6bcbf07838160408a93a85b4a
SHA256367d1c6ea073049cc924a2a1286ededa24a1e55394f795b2298b6300f8441cc5
SHA512ace89b371422d339a91066a7b5e6cd9786f9a75e0a5d69d46cc4d691408b6527cd9d21fb5e10dac2d9c2e3d9810a0147d11fe75915c9308bd40e9eb9b9ae6d33
-
Filesize
197B
MD55f9891607f65f433b0690bae7088b2c1
SHA1b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA51276018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c
-
Filesize
559B
MD5209b7ae0b6d8c3f9687c979d03b08089
SHA16449f8bff917115eef4e7488fae61942a869200f
SHA256e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA5121b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25
-
Filesize
504B
MD50026220045ae9c28295aad9fada0e2d3
SHA1dbc6c8984e99a3ed461ff848322ec27bc53f7e74
SHA25691450c5edc2728620bf5917301f7337016a4f3f059b129c1c35377096403fc00
SHA5127928f99dbf2e5ff94eb135e3567fc52e2d20a145972f16aa7838cb064a50c0d41eb776ac3fd292e5ceabc8481d715fd108320e627cfa30b51bf2ed373cd5436a
-
Filesize
1KB
MD5e54a07bbe4ac9d19e80eca4d946a578d
SHA14c501e06db7db70c80e7bdb7d2e877efb45d483e
SHA25668bf3bc4cdae6477317b5a04d532f18c924eb68cbb33699e0056db42c891ee05
SHA512fe31c8d6caadd2ef988b2cd38ca4cd8a957e7ba8e12960d74756dedf998b0b1150a0f89e5877290a187fc91d04f5d9af1ea12f3c5edc78ddba37c239b02770a8
-
Filesize
7KB
MD50b54ee4edf09244448fb0c84e623eff1
SHA18fd00a3e29575c950a95ad9aebf288351c731980
SHA256edc36f3a710b74f7bb26c667d03d8e94065882a4144a5f768d1e8a6d607a03b7
SHA51212b896d65f8a40d51e2c01cb684f7332cbcf8f82b3b98076a0b90110d83f1196c4b7d5c22231f5b91ba217c51bf4cc3bc7d53e9a17c6975f8119f74e91447968
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90