Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
fbf3a4f28cbad55fdc31984e728985f6_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
fbf3a4f28cbad55fdc31984e728985f6_JaffaCakes118.exe
-
Size
255KB
-
MD5
fbf3a4f28cbad55fdc31984e728985f6
-
SHA1
046c84e90848b545b10d61bd84ec7a1819b0c1f7
-
SHA256
58ad0f6782a700d326b3a255b10677fe6630bc6736eaa174958e4dc2865a87d8
-
SHA512
07060d2e281c9471564b85c68529ca94551df4b908bae36bf5e4c09d5bd493f7e3ccbe8a0b26a028a2616c38a7bc8d3f68b06cfad7b3bafcbaf6d04106e394fd
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5bnCrpw7B0ynVmGHR1:h1OgLdaObnow7BBVmGHR1
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00050000000191dd-77.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 3048 51330a04bf1b3.exe -
Loads dropped DLL 5 IoCs
pid Process 1632 fbf3a4f28cbad55fdc31984e728985f6_JaffaCakes118.exe 3048 51330a04bf1b3.exe 3048 51330a04bf1b3.exe 3048 51330a04bf1b3.exe 3048 51330a04bf1b3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x00050000000191dd-77.dat upx behavioral1/memory/3048-83-0x0000000074D00000-0x0000000074D0A000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\dkijgegbickkpdnanoijikginaomgkpi\1\manifest.json 51330a04bf1b3.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5BE27F7C-97DE-BA13-9EF5-36E9D134E5FE} 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{5BE27F7C-97DE-BA13-9EF5-36E9D134E5FE}\ = "PiickNoseaveeIaT" 51330a04bf1b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{5BE27F7C-97DE-BA13-9EF5-36E9D134E5FE}\NoExplorer = "1" 51330a04bf1b3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0006000000016e24-30.dat nsis_installer_1 behavioral1/files/0x0006000000016e24-30.dat nsis_installer_2 behavioral1/files/0x0005000000019216-99.dat nsis_installer_1 behavioral1/files/0x0005000000019216-99.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BE27F7C-97DE-BA13-9EF5-36E9D134E5FE}\ = "PiickNoseaveeIaT" 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\PiickNoseaveeIaT" 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{5BE27F7C-97DE-BA13-9EF5-36E9D134E5FE} 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\PiickNoseaveeIaT\\51330a04bf1ec.tlb" 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{5BE27F7C-97DE-BA13-9EF5-36E9D134E5FE}\InProcServer32 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BE27F7C-97DE-BA13-9EF5-36E9D134E5FE}\ProgID\ = "PiickNoseaveeIaT.1" 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BE27F7C-97DE-BA13-9EF5-36E9D134E5FE}\InProcServer32\ = "C:\\ProgramData\\PiickNoseaveeIaT\\51330a04bf1ec.dll" 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{5BE27F7C-97DE-BA13-9EF5-36E9D134E5FE}\ProgID 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BE27F7C-97DE-BA13-9EF5-36E9D134E5FE}\InProcServer32\ThreadingModel = "Apartment" 51330a04bf1b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 51330a04bf1b3.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1632 wrote to memory of 3048 1632 fbf3a4f28cbad55fdc31984e728985f6_JaffaCakes118.exe 28 PID 1632 wrote to memory of 3048 1632 fbf3a4f28cbad55fdc31984e728985f6_JaffaCakes118.exe 28 PID 1632 wrote to memory of 3048 1632 fbf3a4f28cbad55fdc31984e728985f6_JaffaCakes118.exe 28 PID 1632 wrote to memory of 3048 1632 fbf3a4f28cbad55fdc31984e728985f6_JaffaCakes118.exe 28 PID 1632 wrote to memory of 3048 1632 fbf3a4f28cbad55fdc31984e728985f6_JaffaCakes118.exe 28 PID 1632 wrote to memory of 3048 1632 fbf3a4f28cbad55fdc31984e728985f6_JaffaCakes118.exe 28 PID 1632 wrote to memory of 3048 1632 fbf3a4f28cbad55fdc31984e728985f6_JaffaCakes118.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 51330a04bf1b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{5BE27F7C-97DE-BA13-9EF5-36E9D134E5FE} = "1" 51330a04bf1b3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbf3a4f28cbad55fdc31984e728985f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbf3a4f28cbad55fdc31984e728985f6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\7zS18FD.tmp\51330a04bf1b3.exe.\51330a04bf1b3.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5f3c79bda3fdf7c5dd24d60400a57cadb
SHA11adb606aaeedb246a371c8877c737f0f8c798625
SHA256a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935
-
Filesize
115KB
MD500ce3831a16a62c6d7ea4b21049e4b22
SHA13e48c8d25b196d67722ed20cd36bf3448a4c9136
SHA256d4bb7937b36973cbf3b12c9500c25ed34103944a69bad9162f3b98f39474529c
SHA5127633071b26d802aae1250111baa40e5158fb1a1639d76098f2ecd6263adf0e6371d5e9a70d9005b267cb907da84235f4e361f8c8a75b8adbd19a049ab1227619
-
Filesize
18KB
MD5d5980ff8eb0ef4276fad96fba8fc5018
SHA12cb05f8b43aa3ae2f5492f590997eec6ff808fe2
SHA256ac3a1daa32b1c489f9c2f4413ab35c4fc90b54a52ede0fb53276666e6eeef16f
SHA51230404f467dd727a7de132fb08cd3c88abf5fb2e7ef18f24af5371b63fd106d6d5757061ec55c7b54daf9844100280670bf2b22a71c89b160048552b5eec12d0c
-
C:\Users\Admin\AppData\Local\Temp\7zS18FD.tmp\dkijgegbickkpdnanoijikginaomgkpi\51330a04befbc7.88494439.js
Filesize4KB
MD59586f223f16e1b6dcdbefd7939056364
SHA1cbe666988096ecafb7af37532821bdb2a648653a
SHA2562e90ec6849d714f2dd837308e8727060ff7dd5e4d298205b4d629c8484e37105
SHA512e61f7ab2f7df2f1c85bbe4bf774e2446945631a435e29712e70887455c6e72882331c2d7cae47af78090106806a2f630de00daa191c14cb6a319a165c5e7e91f
-
Filesize
161B
MD585fb97dde88266e46ddce287f1898f9c
SHA14bd250e18215e8aaff1266ca5588c7b21c67cc92
SHA256b3b91facf07161be58de700dd0ef36956de9d9e1ffd9ff999883aeee6ffb3d95
SHA5123f67d00c522c606ef94c9b2ebd9ee9bbbde8d27bb5929730c7074b923c35e2d94575253f60ff2d05e2b4263aca2d47491935c3d1a15d22a1903ac7b6060bc0d0
-
Filesize
197B
MD55f9891607f65f433b0690bae7088b2c1
SHA1b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA51276018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c
-
Filesize
559B
MD5209b7ae0b6d8c3f9687c979d03b08089
SHA16449f8bff917115eef4e7488fae61942a869200f
SHA256e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA5121b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25
-
Filesize
509B
MD53b84e6521d12dd3b73d401b9ac16e924
SHA14b1c2998f527d9d459c480fb2a8950268f059f34
SHA2562c9d100199f207c2346b492cda840d4dd17a06c821cf523569c7d7ec6f2d02df
SHA5124b6f1d80e9eee3cff97a74af0af81b510755c5c68cac4f9b321ee5a87857473fb230ef21f87e874b29e96a0cfc955a540e57ddf7b6f437914cf28f4bafb20cc0
-
Filesize
1KB
MD512bbec7385e3a442e302642a0d8d3ef4
SHA13a04e65d7f913b2f35cb5aaa338fd81a2aaf9863
SHA256365e56062b92879c03009f4f6a63afb7c19e85e1422c44c2924dacd8ac9746ce
SHA5121f07030eabc4a51f6b0916e33e57e1d60339be44390118dc61f8184b96076fa30d1684fb6dea0b878c16fb5dfc60bbedbc0b5df244fc0eed2fa1391888898d19
-
C:\Users\Admin\AppData\Local\Temp\7zS18FD.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5658973a945a3c137971a890ff8e47900
SHA1d74e6e806dada05552824b888eff7bbb7249e261
SHA25659afa3b5c4f6e117ecddd1c31a795d03de4b80efef6c6a730e034a49d9352d86
SHA512aac38c69b9db1d6473e291abc93dd7f321560a95c4b1360335daf28cb4685ea558f7940fc81ba100f9623c2e16067a5d85fe63e7c95cfb4e389cd5874b695421
-
C:\Users\Admin\AppData\Local\Temp\7zS18FD.tmp\[email protected]\chrome.manifest
Filesize116B
MD575e0372a24aa215fa4c2cc7cbcd4cfc8
SHA1d899934504c2627a3a907168d5df5920bb9a8d7b
SHA25600077de40d88a8e7f4e99c1f1a3f43793845dcaf69ad5a60c1b4461edcaf48b3
SHA512325ac123c91b7bed1b804f256579cc7ed2b77530e8e804d2cf4012784ce8669f28f80a7c9d11ea08ca7ccd99cbc32004373a6540fae520683d9a911178182179
-
C:\Users\Admin\AppData\Local\Temp\7zS18FD.tmp\[email protected]\content\bg.js
Filesize8KB
MD54dbb80b0cbc79ad3169f0a0c9cb0a7c3
SHA1b5bfe4ff4df490efef1dbe918fe7dcdd930d6e5c
SHA2563ab63ab5a133263ffd6db1156cec49a544f327130b25e1a1d77047ad5df0eda8
SHA512de7394865a6684600afe2200f92c82e49314a7cb8c639e9d14a88cf7341f3da06b46a7d0d74b9359f6a787b2ff69174839a005b334cb3ca0f64475033b471800
-
C:\Users\Admin\AppData\Local\Temp\7zS18FD.tmp\[email protected]\content\zy.xul
Filesize225B
MD5cc200e3ac519dee7fac38797e3225f73
SHA1525970278a64ed2fe2414716b2939df58b4fe955
SHA2562dfe0e2c0813c0d1929437e72ec75795b192c5dd52558bc0a0f44787a521ea70
SHA512d96196fb395068abb52b8b1cf8276385a56775c966ab5f541ab33dd777f217f7a7f88429dc76a5dfab49b4f58651f37e06cd9009c830932eb901d7bc1fdf65ab
-
C:\Users\Admin\AppData\Local\Temp\7zS18FD.tmp\[email protected]\install.rdf
Filesize604B
MD5cff96f488355c860172e4b172d444f01
SHA1272a4ef1343272bba732ddbc0dae99ae8a4fed72
SHA2560191fbbb2e1738f9c05ffcfba2a8a1402aa6ed95dfb12acdb9ddbb9b2ade5002
SHA51214bfd320e8796bc1a58ba83e9e6a52d9463cb6ec101beff7966484446cb18d66b00c391ed3ec90f41d5d760e51592a3bd3afcd3135fd706a669e3a542aad4eb1
-
Filesize
6KB
MD5c180d5df19948d224ef55eb88701159b
SHA1820d6e891160be72818148b06855ba8b792b8152
SHA256bf47f1967842874063153f9e065ba21b1ed1c6805d1ef3504faa8e83c74f89ad
SHA5121f2772098f5c1f0c506024de36a739a255d7b49e5b51ff42a2321733b15eb3cc82ee717764d9f412c5a465a4b17ebe7d3184a6512c301c42d624d19bee5ce0af
-
Filesize
71KB
MD5b78633fae8aaf5f7e99e9c736f44f9c5
SHA126fc60e29c459891ac0909470ac6c61a1eca1544
SHA256d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA5123885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90