Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 13:28
Static task
static1
Behavioral task
behavioral1
Sample
1a4c273cfa7cf5f321445ac4a200044a_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
1a4c273cfa7cf5f321445ac4a200044a_JaffaCakes118.exe
-
Size
315KB
-
MD5
1a4c273cfa7cf5f321445ac4a200044a
-
SHA1
bc58669735823b21fa56230a3687759d01f7de32
-
SHA256
db3517d4ff73532b95a142e3ebaf454df5dc06c9aad7f0798444ad29e91787b5
-
SHA512
3942eeec73374c13f50c68e8843b00d25de81deaa5ff383bab9e6df2c1a6a2afc16ba903f54106a2b5b45e9df35ee3dc05c74faefe783d6e03994521c56b7177
-
SSDEEP
6144:91OgDPdkBAFZWjadD4sUZRlwx+P2TSMIkZBGwipHh3:91OgLda3ZbwM2WMFd0B3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3660 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 3660 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\ = "DownloadnSave" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\NoExplorer = "1" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3} setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x00070000000233f0-31.dat nsis_installer_1 behavioral2/files/0x00070000000233f0-31.dat nsis_installer_2 behavioral2/files/0x000700000002340a-100.dat nsis_installer_1 behavioral2/files/0x000700000002340a-100.dat nsis_installer_2 -
Modifies registry class 63 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\Programmable setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\ = "DownloadnSave" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID\ = "{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\VersionIndependentProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\ = "Injector 1.0 Type Library" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS\ = "0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\ = "DownloadnSave Class" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\ProgID\ = "bhoclass.bho.1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\InprocServer32\ = "C:\\ProgramData\\DownloadnSave\\bhoclass.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32\ = "C:\\ProgramData\\DownloadnSave\\bhoclass.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\ProgID setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\ProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\ = "DownloadnSave" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR\ = "C:\\ProgramData\\DownloadnSave" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\InprocServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\VersionIndependentProgID\ = "bhoclass.bho" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\InprocServer32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\VersionIndependentProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID\ = "{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer\ = "bhoclass.bho.1.0" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\InprocServer32 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3}\Programmable setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 952 wrote to memory of 3660 952 1a4c273cfa7cf5f321445ac4a200044a_JaffaCakes118.exe 81 PID 952 wrote to memory of 3660 952 1a4c273cfa7cf5f321445ac4a200044a_JaffaCakes118.exe 81 PID 952 wrote to memory of 3660 952 1a4c273cfa7cf5f321445ac4a200044a_JaffaCakes118.exe 81 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{DAE51D9B-EBEF-0D7E-ED52-5B66933D74A3} = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a4c273cfa7cf5f321445ac4a200044a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1a4c273cfa7cf5f321445ac4a200044a_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\7zS413F.tmp\setup.exe.\setup.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:3660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD52628f4240552cc3b2ba04ee51078ae0c
SHA15b0cca662149240d1fd4354beac1338e97e334ea
SHA25603c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6
SHA5126ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b
-
C:\Users\Admin\AppData\Local\Temp\7zS413F.tmp\[email protected]\chrome.manifest
Filesize114B
MD5f04cd11736e479df4cb8ef976379d01b
SHA1914405be776bdd75f5a42070829c72b52b6c8d9c
SHA256aa2baed3d096ac819d2cdbb8c2fd40dbd6bc1e83ad0a1eb84f55440c52263f05
SHA51233a6e97da59b53ad9f49d9e919a5f8555fac0e8bd156fe513559d562d67c24620bfb3bbb61fa205dd5a49e9f1ae134b8348dfa5a36e208d38c916a5c7a93d365
-
C:\Users\Admin\AppData\Local\Temp\7zS413F.tmp\[email protected]\content\indexeddb.js
Filesize1KB
MD5679c6c85edb3b5dbe0e10d92abd1636b
SHA1dec953d3ab18d3d37983e1bfa778ea745b255dc0
SHA256129386486f2ab49372759edea73253c6d43ebaeac5a1ee920eca5678a8c9628a
SHA512990772ef0c3cc10f3f6979145edfd6a1c7aff8d0235d5a4d60679fa9affeba9174bf9f1b8195092c36bd8174b0639fdc2ef0f3ba86bec8f7fde1a1cff708000d
-
C:\Users\Admin\AppData\Local\Temp\7zS413F.tmp\[email protected]\content\jquery.js
Filesize91KB
MD54bab8348a52d17428f684ad1ec3a427e
SHA156c912a8c8561070aee7b9808c5f3b2abec40063
SHA2563739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23
SHA512a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480
-
C:\Users\Admin\AppData\Local\Temp\7zS413F.tmp\[email protected]\content\jsext.js
Filesize6KB
MD57bb35dc58e897144f306be4a788c5f53
SHA18da7bb822a0a8eeca67c7d28881dde96fbad2c97
SHA256c7fdb479e4ba5b1d1d886a2ead35b86ca9d71dc8aaeb904178c0341da9a26945
SHA51259073412c82f3a8794dc9c8efa477a72bc3ca5f25b154b3fe28830fa6821bace2de01a5eaae4945ce59f7fcc62f4cca4238ef1aa69e564d826e476df0b71337c
-
C:\Users\Admin\AppData\Local\Temp\7zS413F.tmp\[email protected]\content\lsdb.js
Filesize1KB
MD5824dac720ec0b611da89c8340c2a6db6
SHA1ce49281050ff1670ce2fcfe03f18032f9b866f46
SHA2562f8f82ec554e524d84324c507ed7cca19387e109721912eb99331c7bb84a2ff6
SHA512b6e973811d2073ecc74e687b4927660a2067cff909395253ce5d1cc56b5b0f57cb91daca7f1f09b736f50e0f39434881040876faad16fb5796d0d772d7d48069
-
C:\Users\Admin\AppData\Local\Temp\7zS413F.tmp\[email protected]\content\prfdb.js
Filesize1KB
MD51282c764106127c565ee7e714e45ede3
SHA16d00938c4bda14d068464aba401bf7e4d3f1ba7e
SHA256c0f67d3fb58bc97150cfd7b795aa4e394ca0ce5843f78f498f12c5f6a98aa5f2
SHA512207454fbc0f9fc1cba05f8d6bf6907fcc8008ea1b85cc51e0c12c3bcd971bab7923c97603ebd22c811b5c7860137698653843facd9048f8a11b5650000a934bb
-
C:\Users\Admin\AppData\Local\Temp\7zS413F.tmp\[email protected]\content\sqlite.js
Filesize1KB
MD5b8408642b1d951ab4425346631a666b1
SHA183b9ef14394c0b3caabfaeb504f37ce0d56e7b21
SHA2563f109b29b6aeecddc0ad2159ee7e96fea6c3476437d9a789d5025a8dd7ef236e
SHA51279d93444625568b086ff0eb6cc6d0535f29bc5637ed49d8dac553bc66e82bb2fcc63f45e5595eb2c519d3e703d0b298e9ba86f441fc66dec520f4d79131a4778
-
C:\Users\Admin\AppData\Local\Temp\7zS413F.tmp\[email protected]\content\wx.xul
Filesize228B
MD5d3593498e667aef969631ef8d0e587cf
SHA14ace2de69a9a7f32182fb450d024b0366c346255
SHA256e695c01afd0cbd21a97fa9e66d581256344de7ab0bb617cd65cae9942011c43c
SHA51264ad99d8b2e363973fd2552bf65c29d643193d92f9055722cd63d080c917d18e3377a81610c277f96afa7513524234defcd99d36b68bc8457d7375ab1cf5480c
-
C:\Users\Admin\AppData\Local\Temp\7zS413F.tmp\[email protected]\install.rdf
Filesize683B
MD57e3c935db1d44373dc763ee1ec028030
SHA130ac9507b88de522dcf8b63df64fdb5b55a84c0c
SHA25671bf90807efdfb839c761d4cf93d4973998c06c76cc69b81b619231efcd17407
SHA512b7af678450a474795fe6b5d79f7f6386fbc715311e00da13afffae10bdcb681853db10cce5edbb5803ccec4312aeb4253c746345cbcc522e0160e7f6f3161ad3
-
Filesize
5KB
MD57c5803b920f026796395e16c539086c2
SHA18f2948aaccdb39da4877331e161aab1ed3cc5d5b
SHA2564d265ae6a624b7c6cab3cf068722a8e23a5c033443546ddf6ffe29f0f4802947
SHA51254590030ef1cf4465d5e411a9d756ea9b8e5c7729b8bba63faba13c908d4cb47901bab00db23e15c0b45d7acdefbd0ac81ec9d8694d136397b82609d0d17438a
-
Filesize
139KB
MD54b35f6c1f932f52fa9901fbc47b432df
SHA18e842bf068b04f36475a3bf86c5ea6a9839bbb5e
SHA2562b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196
SHA5128716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99
-
Filesize
387B
MD5b7cb4be52dcf2452006dd36de32b222a
SHA1987b37152c723d5579bde4cfe99932aad27032ba
SHA256a8ada678d44cf66b2f8c0ca6c9131ac529bc9660560eae8e2b38fead8f974d9b
SHA512ae44b4ed718e02c3a5013e69901b261e869935a015986b89862a2dc1999b7861fd628bfe238dd9a39d1b6fc2605c05a94a05037d7be24929acef0d0cc493f5ae
-
Filesize
37KB
MD5f376e23f8248ada1e545ad5ce2acd285
SHA106e3448be410ee6ffb7066fc901d46867e8ba6db
SHA2567a6d3beb11a42c911e8e1254de196be0048acb1c84f2fed5a252e2e29734cd30
SHA512ebc331d768ddcde743367b4f13397da5d4c531f8646195e3e9ae5411fdb7d44cb8d0f2c52087ca9177d56a74a90ae5c8b8d506dce3fd75766d602a5ee8212fde
-
Filesize
618B
MD52895576129d5e014ac77ac0e25865246
SHA15c363540e1416c9793c4ee0f12b41c27163ff5c9
SHA256e2eb38fd27501f3ae7defaeb3668575968f1162cc2708c15ac642cdf4fb22c8c
SHA51206a9f0a7077b0f1e7f98d4dcc02f267fcfece3d5cf0c5da63c5dffe092f52d25ceab93511af1389fedfa33ab715ff9307507f1ae149a07289c4042eb002231c9
-
Filesize
61KB
MD5201d2311011ffdf6c762fd46cdeb52ab
SHA165c474ca42a337745e288be0e21f43ceaafd5efe
SHA25615c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa
SHA512235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b