Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 04:50
Static task
static1
Behavioral task
behavioral1
Sample
4cdd64ed3ae2f8d9adad1b2cfaa6a7a5_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
4cdd64ed3ae2f8d9adad1b2cfaa6a7a5_JaffaCakes118.exe
-
Size
313KB
-
MD5
4cdd64ed3ae2f8d9adad1b2cfaa6a7a5
-
SHA1
092209b4b9105b4d456a83bb0acae794b11ab527
-
SHA256
c0ce7d0d3be9cfe72af34b622685a9ce278056d144bf3719be032375600f044e
-
SHA512
be33064579a345bfeb96c797778b2655db091887430d5272306bbe2517af3e7858214db04bc5fc7c04df16b7439a9359aa59c79bfafcc7ad4012ae05939d2e0a
-
SSDEEP
6144:91OgDPdkBAFZWjadD4swX3+FbwOPltDgWR+yQc7dgFZdfq:91OgLdaPk0OdCWR+Kenq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3884 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 3884 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{10503900-E975-869B-8A63-F09611B84023} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{10503900-E975-869B-8A63-F09611B84023}\ = "wxDfast" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{10503900-E975-869B-8A63-F09611B84023}\NoExplorer = "1" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{10503900-E975-869B-8A63-F09611B84023} setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x00070000000234ba-31.dat nsis_installer_1 behavioral2/files/0x00070000000234ba-31.dat nsis_installer_2 behavioral2/files/0x00070000000234d4-100.dat nsis_installer_1 behavioral2/files/0x00070000000234d4-100.dat nsis_installer_2 -
Modifies registry class 63 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023}\ = "wxDfast Class" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\ = "Injector 1.0 Type Library" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023}\Programmable setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023}\InprocServer32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\ = "wxDfast" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023}\InprocServer32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023}\ProgID\ = "bhoclass.bho.1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023}\VersionIndependentProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32\ = "C:\\ProgramData\\wxDfast\\bhoclass.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID\ = "{10503900-E975-869B-8A63-F09611B84023}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\ = "wxDfast" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023}\VersionIndependentProgID\ = "bhoclass.bho" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023}\ProgID setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023}\Programmable setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID\ = "{10503900-E975-869B-8A63-F09611B84023}" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023}\VersionIndependentProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS\ = "0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR\ = "C:\\ProgramData\\wxDfast" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023}\InprocServer32\ = "C:\\ProgramData\\wxDfast\\bhoclass.dll" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer\ = "bhoclass.bho.1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023}\ProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10503900-E975-869B-8A63-F09611B84023}\InprocServer32\ThreadingModel = "Apartment" setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3448 wrote to memory of 3884 3448 4cdd64ed3ae2f8d9adad1b2cfaa6a7a5_JaffaCakes118.exe 84 PID 3448 wrote to memory of 3884 3448 4cdd64ed3ae2f8d9adad1b2cfaa6a7a5_JaffaCakes118.exe 84 PID 3448 wrote to memory of 3884 3448 4cdd64ed3ae2f8d9adad1b2cfaa6a7a5_JaffaCakes118.exe 84 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{10503900-E975-869B-8A63-F09611B84023} = "1" setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cdd64ed3ae2f8d9adad1b2cfaa6a7a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4cdd64ed3ae2f8d9adad1b2cfaa6a7a5_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\7zSD30F.tmp\setup.exe.\setup.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:3884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD52628f4240552cc3b2ba04ee51078ae0c
SHA15b0cca662149240d1fd4354beac1338e97e334ea
SHA25603c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6
SHA5126ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b
-
C:\Users\Admin\AppData\Local\Temp\7zSD30F.tmp\[email protected]\chrome.manifest
Filesize114B
MD5b10b324addd5d751201d7097f8cde3b2
SHA1bbcd1d4b240ed6e34ffa2beed0809a4cef438827
SHA2567162c1400ffacd78351be878b178148e73ffea0588b1cbd43614ea64628df921
SHA512c001899f0a7cb5d057cde0abccf06ea9337564f47e6e0dd22f62c852879d476520ef3d57e0ee71d63f025b7588f2be661898237f5dc17039f5c8a1f50ac0e675
-
C:\Users\Admin\AppData\Local\Temp\7zSD30F.tmp\[email protected]\content\indexeddb.js
Filesize1KB
MD51bbe9c1f9c68f62b01e64ebc39de9f4b
SHA11865d72d12c686d24275043539ca285399f16d2a
SHA2566b433282125193e08afddc3ff6d5063f749ab8665bf25306591d215407a4c93b
SHA51251f3b1317daf5c69caa77b3f0eeb5875c22ac8b7908be8f5bf7e9188fcef0a257a932f8d4394464972bf67b2c2fb5c6ffd657d240b444913c493eb4b499eda97
-
C:\Users\Admin\AppData\Local\Temp\7zSD30F.tmp\[email protected]\content\jquery.js
Filesize91KB
MD54bab8348a52d17428f684ad1ec3a427e
SHA156c912a8c8561070aee7b9808c5f3b2abec40063
SHA2563739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23
SHA512a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480
-
C:\Users\Admin\AppData\Local\Temp\7zSD30F.tmp\[email protected]\content\jsext.js
Filesize6KB
MD5397527b2bab9aad757009e11aba03d3f
SHA1f479f305efb1cbfb753c816846acb560174e4475
SHA2564dc5d4e759b4652c5b8df38c075f7c2cd186a3bba43ba08bd307f04d06fafca9
SHA51255b5131ab6ea502dd89912b0ea0bd70573af39352eaff32c1314d966cb8cb54e108f9b41228fbdcbd7dcbfc0165e670d012071c511338909e3d33f560a6e551d
-
C:\Users\Admin\AppData\Local\Temp\7zSD30F.tmp\[email protected]\content\lsdb.js
Filesize1KB
MD5c10b0db33c9a8b15b1c8c923738b7461
SHA19bbd22126f6095aef03e2c757ce88c7f2cd84fdb
SHA256e1a3e9836a935d4b6ede08f3e374f3e4b23a96e1acdd5aaeafbb45f680b5ac22
SHA512e994e532c913b940cb32926778c1514061698ffe8430407c85624db9c44fa25e2a5fa73423c2e1cb4b1099011b4873723ac27e5a0c1c93518cd4f2f3508f7969
-
C:\Users\Admin\AppData\Local\Temp\7zSD30F.tmp\[email protected]\content\prfdb.js
Filesize1KB
MD5cce221c273c1948ff7b4d13138d6c0f1
SHA124fd4b1059f4dd70c616ca940664c71d4800ca39
SHA2569177674f7fd335299293347585ddca44dc463514556435b8dd564665600d0e0d
SHA512d2b2e58d4924644fd5401a9973601f217ed6de66d2987d516c23e926b508d9b99a45e7d3f376c0aebbe655b7f0832c5a9f143e5f1b434ef761f6231fb0a17ca7
-
C:\Users\Admin\AppData\Local\Temp\7zSD30F.tmp\[email protected]\content\sqlite.js
Filesize1KB
MD5daf00d4495e385793343c3e2a84972a6
SHA16da29228ccdc80e960d0ba2daabaab5b2c0848b0
SHA256b13019de6dae2cccf1810fb1a3830cd6d7cbc53dcdd5d897a854eb1b6ed305fa
SHA5125f59d933b464ea54509e9c2039177934a6e7c5ef1a28594feab9f8784ecb67ffbbb32662982a446a3bb7e29e68c22edeff9db2baa0dce0d488d9fe89174d08b0
-
C:\Users\Admin\AppData\Local\Temp\7zSD30F.tmp\[email protected]\content\wx.xul
Filesize228B
MD587db48156e7d8ce094a218ec2e05fb4b
SHA19f1e1fb2d5eef1d5736439058ef017f867516e07
SHA256e875068565307c6ccc086b5c7ba3ee756484ec3439670ae4f8999022a96c2a84
SHA5121559e8e23b1e667c8e8dfdb5f9c3af8b3aaf44549b953709af33c7dec4d2190b5bd0a06c4418947631412a17293e2f479700c32c4658f5f45c41e2c73a3efd1d
-
C:\Users\Admin\AppData\Local\Temp\7zSD30F.tmp\[email protected]\install.rdf
Filesize677B
MD5bebd70bc350ac7f5f99dcc295b401cdb
SHA1d78c3bd24d5f19262a1309b322cab56801db77f0
SHA2569db2f38bdf0bd4bb3183064bae947502ccedc4613a06595262d1fca97f0bd08f
SHA512cb8e9121cc8396408de368a0735e9beca66b19f9e1da3ba2e0c18b1eec3ad0fa0c576bbff02c6bcb33bd45d7e57556c345c2db3c17247bd022132a85e716d02a
-
Filesize
5KB
MD5a13ce133281b4c8a2a7593db005acaee
SHA105b776631a2c28336f8adcc281dfa229b5339a23
SHA2568d57b77d3664ecf2bcf00f3ada7c8dd255639f51c0f72ef3deafeb26af3ad458
SHA512f2591af7125a00b960d95cf4d60e43622598fb2006d46af9bb274b8b29e31f5e31e2b9ab039bd3673dc494079f9ca938c6072aa9d2c894c5ee68b52cf5962d92
-
Filesize
137KB
MD5ac13c733379328f86568f6e514c2f7f8
SHA1338901240fedcef4e3892fd4c723c89154f4de05
SHA2567bf09b5c2a9b6348227199c1b3951b57907ca6a5c215a04ad8d5e43232f5b562
SHA51235f69a82694a2ea4268a3dde7940af6bd1c87a32d93a72723464f90e4e818805be9e80872469d1cc29150a9aac872fc78613a584baa1327dfa8478c2de5672c4
-
Filesize
386B
MD5fb41cff33fc535562f8545fb27e70c05
SHA1d939ce2b46750c646688fb62185953fa5415bc02
SHA256766e314dba7d7c45ae4a42a13fc429f534810ed9b46eb87b787ae782baf285a7
SHA5120a57b193dc95e2719d8cd044968bb7f116df4337a29772febf44f2e84296b22b104e24b542de0c1f7a594dd8b43d9edb04d188529625451831c8b1b175489764
-
Filesize
37KB
MD5620e6cee01d6e265ed0298923a70321e
SHA106386efbefb0ad5785f53a153a6003dc0533a558
SHA256744b04cd2409ddd51cca003fff5e4fad18408c3aaaf085a983c7e554e9fcc71b
SHA51243a2035487eaa1330b52de8ab14deb7bb25aec413ca9ad5e8774513db07879f1f944b0f35f8c2c73d1d76ace4a33918e1cb6210cb8a38441cd5d98b343ac90cd
-
Filesize
599B
MD5a5a3c1968d13b052f81aad43b880ba2a
SHA17ecb6e287650706d5bd5468eb99b80fbf24251a6
SHA25671efafad5997d5f45c415c9abd40b0d99282f1d95884870372d03803949acb8b
SHA5125d47706cceb5e4abecf87c0141035d6acf43ea59327b843747c58b04c8b04a52a95037c8f433efefca6151ccf199e3937eaee956f67f59ef36973932cd19d3cc
-
Filesize
61KB
MD5201d2311011ffdf6c762fd46cdeb52ab
SHA165c474ca42a337745e288be0e21f43ceaafd5efe
SHA25615c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa
SHA512235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b