Analysis
-
max time kernel
17s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 07:33
Static task
static1
Behavioral task
behavioral1
Sample
5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe
-
Size
257KB
-
MD5
5afdc3fdaee35c0644d5cf62fb7fe58c
-
SHA1
5558383b2b15602ced0477cde056f56f009d69f2
-
SHA256
e4d57e56774936a8c40f67d4378fec5252a9d2c20512ae2f4ec9ad4144a3da07
-
SHA512
a25a5168889718939109280f1e0725671127190d80493c36b88b22ca0e1185855c2e7e417641bacc5f17db0de608463d2e13b9b489cdaa778ba9baa0c50a0b89
-
SSDEEP
6144:91OgDPdkBAFZWjadD4s5VrWPtxLNAmEnJt86HI4m7iX:91OgLda+KvLNtEnJH/m70
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1572 setup.exe -
Loads dropped DLL 6 IoCs
pid Process 1732 5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe 1572 setup.exe 1572 setup.exe 1572 setup.exe 1572 setup.exe 1572 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\ = "Bcool" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\NoExplorer = "1" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32} setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x000500000001997b-22.dat nsis_installer_1 behavioral1/files/0x000500000001997b-22.dat nsis_installer_2 behavioral1/files/0x000500000001a463-82.dat nsis_installer_1 behavioral1/files/0x000500000001a463-82.dat nsis_installer_2 -
Modifies registry class 63 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\InprocServer32\ = "C:\\ProgramData\\Bcool\\bhoclass.dll" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.dll.bhoclass.dll.1.0\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.dll.bhoclass.dll\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.dll.bhoclass.dll.1.0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\VersionIndependentProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32\ = "C:\\ProgramData\\Bcool\\bhoclass.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR\ = "C:\\ProgramData\\Bcool" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.dll.bhoclass.dll\ = "Bcool" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.dll.bhoclass.dll\CLSID\ = "{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.dll.bhoclass.dll.1.0\ = "Bcool" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\ = "Bcool Class" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.dll.bhoclass.dll.1.0\CLSID\ = "{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.dll.bhoclass.dll\CurVer\ = "bhoclass.dll.1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\InprocServer32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS\ = "0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.dll.bhoclass.dll setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\Programmable setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.dll.bhoclass.dll\CurVer setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\ProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\ = "Injector 1.0 Type Library" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\Programmable setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\VersionIndependentProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\ProgID\ = "bhoclass.dll.1.0" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\ProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\InprocServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\VersionIndependentProgID\ = "bhoclass.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32}\InprocServer32\ThreadingModel = "Apartment" setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1572 1732 5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe 29 PID 1732 wrote to memory of 1572 1732 5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe 29 PID 1732 wrote to memory of 1572 1732 5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe 29 PID 1732 wrote to memory of 1572 1732 5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe 29 PID 1732 wrote to memory of 1572 1732 5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe 29 PID 1732 wrote to memory of 1572 1732 5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe 29 PID 1732 wrote to memory of 1572 1732 5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe 29 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{DCA36BD0-C2D4-3B0A-5B0D-5565973C9A32} = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\setup.exe.\setup.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:1572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5a724dac649142fef71fe4b529684e969
SHA1e2878e84886ec53a1332ad969a825062526b5cd4
SHA256b58c58b5073034d74c5d93902bbb9d402be063e907bdf77115b55bbb99af21dc
SHA5129f475ad52fa2b7f82e74df87c02e42f937b5e3b62773b7d51cb53facfcc8b4934ad3c2fc21496cfabaa4dd103a309ed5cccad1ad3d6037f6c4f3a540e3e9d5b3
-
C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5355acb11a6ff4196ce22321151904986
SHA1281d1d14251b51b63c17feb7c7b35ead7a7155f5
SHA256bb5942a870b95b49b30e4b1ef244efdc7888fbc94df44aeb49523beaae1c36a2
SHA5129cdebc8689dc44900e681c7f8b3826284458fbbe7e09e8b2d6aa81bf26d3242305055dc961e0a9fbbbd37558ad536f0ab38841b21274191b6b301508e2726ef0
-
C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\[email protected]\chrome.manifest
Filesize116B
MD5e98faae8f2d6215e41d526de2510b6be
SHA18a2bb72ec487982d40e7948b0054e27b9e615ee1
SHA25615c98c42824ad62dc7e151d2c7ca1bdf857e926ac7eecb1ac259b8359f18ecef
SHA5121f7a0b4072a7f9b883b09501cc5a374dbf64dfa7109a98cca7f664558154cf08dbaa9a0c05ae8820d64ca987018b5f7826f2684596de8853f36b3025020be502
-
C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\[email protected]\content\bg.js
Filesize8KB
MD5ef96a2b335017ada820712f0fb7897a2
SHA12af3e91be76a63827db52478edf9c8110f5a3213
SHA25648c58de819c4df798dd3b857a6f4f0d08bd521217ee888062288256cee916e2f
SHA512653f2be995a569d9dd2a12650579ed16da55899a6962a3a8d1f83ca1e1caee23fffa24a7779daa2cff03119f5bfca9a93dcdfebb0edc4bb18951479a912bfcce
-
C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\[email protected]\content\zy.xul
Filesize225B
MD50887e3346e2b6f1cc25d05d98f7ab2b9
SHA1d304a56857fbc44f0021fe030c29b2a2a249301a
SHA256eb3c66ca082eea85d97336b4d2e085ff5e6f3d7ee2cabf095371b7440747f6e2
SHA512648ed499d5059d118b12ea2cad4f6d88084f84f89e95da2679d910f35c3b25e58bc8fc166070b9ab1e8aabd8cbbe4d86bf9234fba0d2df46cde83d7c691d87c1
-
C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\[email protected]\install.rdf
Filesize705B
MD56830bbe606fa1513fc4b63bfa0f7ce5b
SHA14da9b20abad4e6983ccfc2cbfc055f3facc2f056
SHA256b07a31c2b1a58bbebc35a055b2979f3a34d028818f5819ce0df32df20af9a63a
SHA5128bc1c9edaa3f13282ea63ef0b89d6863a4cae71783b93c1b238e2023763fe74d8653eaf93987d8e8f258a2c3577fd81078a01b39267cb14299ccd09dd147009d
-
Filesize
4KB
MD5c6c12e07ad28d7239179e87a8c8d6a49
SHA1dd498fa252ef25dccbca03dc207e986ed1813036
SHA25604e0fbe5c0a2d4756e5a3d641172267527983766d1d57d1842212c54d81319b3
SHA51213f42351edb677a18d938e7ff0bb04eba9c67db57e9b88c66f5046e30fd3c52a2c37b0b11ce6f7fe8390d647adab97b0ad5c03ed1cbc9bb1bf948e37ffd2500a
-
Filesize
3KB
MD59abd92a1b9fbf1e293ee677e3ff78487
SHA1d6ef3d21fa091f66d103c4cc2604703e3c8fc0d2
SHA256ae53bdf5ae13d6ae274ae5c607f61ce966cf2a645fcf547d7f4e93d298be5afe
SHA512699bf70a62f8311c966bc746aa8e1b65fac0b4d88e684ed227606e6c681649ae0a225bc0aaf0483a193aa90c481415918331a0f63be2eb67f992e88823129955
-
Filesize
164KB
MD5474a025909c75c607905b9e2cae8a56f
SHA183ed7383c8aa53c6134a2b0a701b7b272c5c7c1e
SHA25625ab733f417a9def519ff2443f38cff31baa02743cac803f53f662c875b9be5f
SHA51229d14b6143a45c76904beb6d7ba2d8020f13cd407c66d6eed8825b9e722138f11945a3747988beda0f5bf33acbcb3fcdf8a411a2fc9b07fe501938dc590d03f1
-
Filesize
387B
MD534248ac9228be71d57f634789b4b08b1
SHA1d54a68e1d880f6d0f658c4fb18874f64bcb14d2f
SHA25650b51f6094ecb20ad2bb45ba75f10371e7923a76bb7376ce6930e44555f50e46
SHA5122dbade251344d0fdedb4cdda473d441fa298ece2dd1aeed42d315f5a5e59593c239eb6958171a5b14e9df5f5765e5e6e9367e4cd912e1dbba99f961a72f315fb
-
Filesize
891B
MD5a2e45f96742b34caec9aacea6c3155cb
SHA10036564d84bc7438816837195e74d8f4b2d3d331
SHA25663c7c9092e2ac477a2c5fa379b2c3cbea89f39ae369207aed6257547d2b8d1ff
SHA51216a175cdf566a104988a3a9b199961a141026bd0e0a06f7e503809bb0cf97fd9e3315c1cfcfac9367345b2321c17aa74ec5e6b72e45c3e7a907bbdd8dc8f0e11
-
Filesize
65KB
MD54ccf1a317aa8539c857835e4ebe9c806
SHA1223b73d09d7398f40aff3ccc569e66cae3886ee9
SHA2564529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242
SHA512ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b