Analysis
-
max time kernel
133s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 09:48
Static task
static1
Behavioral task
behavioral1
Sample
158cddd057501f7d7aa00f31ae55f116_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
158cddd057501f7d7aa00f31ae55f116_JaffaCakes118.exe
-
Size
315KB
-
MD5
158cddd057501f7d7aa00f31ae55f116
-
SHA1
9339ce1da196c1e987269af62b6e703b7397507f
-
SHA256
7b8bc4b57561b24c769dede794f0ac0d05bfee4479663a25b2fa3890ae16a82d
-
SHA512
7dbbfb4ac0dba85cf9a4320fac47375be60e02e3b3604c893984d4552930489e058f6662991d0d0576e4cbe0bffc235980d86336f2496b0cd2cb6583f29fae50
-
SSDEEP
6144:91OgDPdkBAFZWjadD4sIDAvTpPmYFdZWD2YojZBzKiKD:91OgLda+vrWCrWiKD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3188 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 3188 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{632E40BB-6E94-9294-CCC4-E2F99FF7302B} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\ = "Codecv" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\NoExplorer = "1" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{632E40BB-6E94-9294-CCC4-E2F99FF7302B} setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x000700000002359f-31.dat nsis_installer_1 behavioral2/files/0x000700000002359f-31.dat nsis_installer_2 behavioral2/files/0x00070000000235b9-100.dat nsis_installer_1 behavioral2/files/0x00070000000235b9-100.dat nsis_installer_2 -
Modifies registry class 63 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\VersionIndependentProgID setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\InprocServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\Programmable setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR\ = "C:\\ProgramData\\Codecv" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer\ = "bhoclass.bho.1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\VersionIndependentProgID\ = "bhoclass.bho" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\InprocServer32\ = "C:\\ProgramData\\Codecv\\bhoclass.dll" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\ProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS\ = "0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\ = "Codecv" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\ProgID\ = "bhoclass.bho.1.0" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32\ = "C:\\ProgramData\\Codecv\\bhoclass.dll" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID\ = "{632E40BB-6E94-9294-CCC4-E2F99FF7302B}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\InprocServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID\ = "{632E40BB-6E94-9294-CCC4-E2F99FF7302B}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\VersionIndependentProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\InprocServer32\ThreadingModel = "Apartment" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\ProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\ = "Injector 1.0 Type Library" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\ = "Codecv" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\ = "Codecv Class" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B}\Programmable setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4544 wrote to memory of 3188 4544 158cddd057501f7d7aa00f31ae55f116_JaffaCakes118.exe 83 PID 4544 wrote to memory of 3188 4544 158cddd057501f7d7aa00f31ae55f116_JaffaCakes118.exe 83 PID 4544 wrote to memory of 3188 4544 158cddd057501f7d7aa00f31ae55f116_JaffaCakes118.exe 83 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{632E40BB-6E94-9294-CCC4-E2F99FF7302B} = "1" setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\158cddd057501f7d7aa00f31ae55f116_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\158cddd057501f7d7aa00f31ae55f116_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\setup.exe.\setup.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:3188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD52628f4240552cc3b2ba04ee51078ae0c
SHA15b0cca662149240d1fd4354beac1338e97e334ea
SHA25603c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6
SHA5126ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b
-
C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\chrome.manifest
Filesize114B
MD5bfaf3acd73f7fc56db6dcd55f781b8a6
SHA18c7a1ade0c3236389fb87e99d8b618955cf0f217
SHA2561312eabf9ac739001aec825b59fc7ba0c5e89edfef40a7318685389f88787bab
SHA512a819cd5582e51d6d49b479c0a3b34534d2f76019d982ae553b87c2c502ef1a7995ae192128e695a6ffeac051a078dbda5a8b6dba047656da1a85763bb7ac327c
-
C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\content\indexeddb.js
Filesize1KB
MD5f3ac1ae71467d5f970cc6a9697a9078a
SHA14de2a9f2d5bac1da3a1374f657877e7afc5399b4
SHA256812d2aa9a3090ffc049567f4cc0852fdfc476ddb6fff0833d59d4b6c59810e2e
SHA512e9cdb0504f621a38e99dc812a574df6a7ca0fa244ed0ab97639c12ecbdb01988ddd3dfbfd2038c952b4a6597956d3956bdb6b70ebdf48c6d7e3dee077a65f247
-
C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\content\jquery.js
Filesize91KB
MD54bab8348a52d17428f684ad1ec3a427e
SHA156c912a8c8561070aee7b9808c5f3b2abec40063
SHA2563739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23
SHA512a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480
-
C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\content\jsext.js
Filesize6KB
MD56c9e7221d41c96d425ee200c78687d46
SHA1d441753db8048b1146291ec124d688ca6da75a25
SHA2563324c5f8a13d0909d6ca2c24fd7fb488b7925a7b4b2cabf6637181f17507dd95
SHA512bce12daa1f254052a0b03bcdfaa301b4af99ebcea93bad05bcfaf265626a0ec0f6f265550acf5521059f07bfe29f6ad64622605dae1e4abedc26900f4aef0022
-
C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\content\lsdb.js
Filesize1KB
MD5546b8385417d40cc6332c5ebfc7c0cba
SHA14791a86842e669fedcd5ed2c99e4ec280f36ea80
SHA256924aa4d7cefaf90da5ccb5944bc8c33c722e54116582dc5e6d00d72d3001d196
SHA512842577aedab39b3ef7cecbf45c94c41a56b0f0ff640ca42f09061935336fc3a56da9926586efb7f410c35cccac937bd72a0604693694736a631b77ea4b1b3b84
-
C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\content\prfdb.js
Filesize1KB
MD5d57c8ba1e4d5fbe4644424c28d3a4cf4
SHA19d1000bd91962f8f22ef270e88f61c332cf511f8
SHA25625906f4821b96a4e237ab5c12549b978cbf1d5ea582053b371b1adb6f30fdda7
SHA512b9be762ed6ce10ba777274e04a640eb044acea26a5f1bb6afc272813cae095c0a343adbf25afe14929b063f13044ff1cb56b99a059aa31519ea0ce7f32e60ebb
-
C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\content\sqlite.js
Filesize1KB
MD54bead26384fedac60290d74baa90dfda
SHA1935b573aaeca1b52a3b6142808dd2b25aad0cd81
SHA256ef5d67ef98f0b450ae55fae8677983d0a84810944a0db43cd30c3f7edbe6a5fb
SHA512088f526ec78d6dea99b0bf08c31e07a3eba88722eba405bdf0ddc8e0be6ef4f7eca66dae131e22cdf329618aebe2b81e112b8b2eb55e047b044212be6d09c61a
-
C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\content\wx.xul
Filesize228B
MD5c0a952540591b64d9489ad78872307b2
SHA1887a404f503ed979d2080ec50c0adde6e0d1d41f
SHA25657d6d04c93d2a8ab403ff989eca0ff7fc3a82c65f80f3ef0ca6280b1688a9fef
SHA512d147b7f3b91c4e9fc92b4636f0b57449303bc8ea61a38f235bf33e8a5248993ac7f68e36801c277ab8d218d89faa19f50041783ace48bbd9abd17150b08bb9c6
-
C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\install.rdf
Filesize676B
MD5cd296c1c2d965a7b8d3e380f23872321
SHA1bb4d238a8ff8522879d4309c33910c4365d3f109
SHA256180b14c82cb111c4a6b84b4e4859e8d81affb2ea88dc7771c8557f7ddfe3fbbc
SHA51249af58cd13a705278e86086f1583400b3f6e89a288391b04185287016c75c93d08174c180cc96f6376122ab0232cd05919321d09b1728431b09c658ac9eb555f
-
Filesize
5KB
MD5b6597c00bd57419d4f8ca4890fba50aa
SHA165049137ded8235651b73c649a77c97e151b4962
SHA256cafbad880729282e08708b7ead438acf976f061fddd7b7a8b5f85841f797f974
SHA5128c0c9d708cd294055bb10d6544daa0ad23fb53cd1efa54d7cb6d1017f0f9e6b9d931ae30823729ba859d577ca54374e5f13b5e0f30c6371c4ac9ea107a3e1802
-
Filesize
139KB
MD54b35f6c1f932f52fa9901fbc47b432df
SHA18e842bf068b04f36475a3bf86c5ea6a9839bbb5e
SHA2562b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196
SHA5128716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99
-
Filesize
37KB
MD58ef3035d23d9453439f1313c66b3e8c0
SHA166b6d99253a234769ae355f4018ca383985f21b9
SHA256c22b41676c87b30845d43e854f52d7e40f8d07983b8ee83c219651a325b274cd
SHA5128525018c14b554b703fd704ddb26f617090e3b2b8aab5bf4b84e13dd626a386d5dc8eb61bf6a201b23e8d60b4b1c9fae830c5e8084f6bc6fc14f11b57fdbcab9
-
Filesize
734B
MD5b1967331e10316faf847727971da30f1
SHA1efa452122a382ed5cacbf090f967f20ce89429e2
SHA256b69942f6ef5f000fb282869f559c9cfb42a7374a91a0924b2ac8cf9a0c3c9190
SHA5127e202c2bcd6a2e4c618f8137bd86e2cc72f99e3b6b0188e100ec592db4c1f9ee1264d6dd4667a0abfa0b7a5bfc2e65373c8574bb39572db4fa53df3bac9740e2
-
Filesize
660B
MD59987e08e3d4a9d8dbbbc3654c6e851af
SHA12cf19c1a9b7ae2d808b01a012aa544fee8e765a7
SHA256f0f8a1928f74f621033d4d2d54b3836ceac823cb4f1cdbb96cad5f89a004e812
SHA512c49c18f16327ae24f04730ffebd0c314b5915d0f39aa8e45b2a0802554bab106fd23f468e018cf043c648ef89e055b50e0edf3eb91ab48109f64770953a5f6eb
-
Filesize
61KB
MD5201d2311011ffdf6c762fd46cdeb52ab
SHA165c474ca42a337745e288be0e21f43ceaafd5efe
SHA25615c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa
SHA512235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b