Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe
-
Size
252KB
-
MD5
8aa7a85b0e8635673ad8f29b51643316
-
SHA1
44009dcd589a87f689a201e962f76f7c44acb694
-
SHA256
3a1c2c4f7306122d9cc9000d2a0290671214f168f5813d9e8a4bb0f19cf5ff92
-
SHA512
4b5f3a08f6d060ccacf81e4ed66626865a4a5093064c3319a31164036014323fa46635b93054153ce04bb6ecf1189f1e7b8c6cd45830a080010c570b59652c24
-
SSDEEP
6144:91OgDPdkBAFZWjadD4sW0BMnO2olfhEf0hBQ:91OgLdaXQM1e5Ewa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2896 setup.exe -
Loads dropped DLL 6 IoCs
pid Process 2336 8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe 2896 setup.exe 2896 setup.exe 2896 setup.exe 2896 setup.exe 2896 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{5F937145-3DB0-723E-DA57-E308A278F0A6} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{5F937145-3DB0-723E-DA57-E308A278F0A6}\ = "wxDfast" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{5F937145-3DB0-723E-DA57-E308A278F0A6}\NoExplorer = "1" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{5F937145-3DB0-723E-DA57-E308A278F0A6} setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x00050000000192fe-22.dat nsis_installer_1 behavioral1/files/0x00050000000192fe-22.dat nsis_installer_2 behavioral1/files/0x0005000000019c59-79.dat nsis_installer_1 behavioral1/files/0x0005000000019c59-79.dat nsis_installer_2 -
Modifies registry class 63 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer\ = "bhoclass.bho.1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6}\ProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID\ = "{5F937145-3DB0-723E-DA57-E308A278F0A6}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6}\InprocServer32\ = "C:\\ProgramData\\wxDfast\\bhoclass.dll" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6}\InprocServer32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6}\VersionIndependentProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\ = "wxDfast" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6}\ = "wxDfast Class" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6}\Programmable setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6}\ProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS\ = "0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\ = "wxDfast" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32\ = "C:\\ProgramData\\wxDfast\\bhoclass.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6}\VersionIndependentProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID\ = "{5F937145-3DB0-723E-DA57-E308A278F0A6}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6}\InprocServer32\ThreadingModel = "Apartment" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6}\Programmable setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR\ = "C:\\ProgramData\\wxDfast" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6}\VersionIndependentProgID\ = "bhoclass.bho" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6}\ProgID\ = "bhoclass.bho.1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6}\InprocServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\ = "Injector 1.0 Type Library" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2896 2336 8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2896 2336 8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2896 2336 8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2896 2336 8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2896 2336 8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2896 2336 8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2896 2336 8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe 30 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{5F937145-3DB0-723E-DA57-E308A278F0A6} = "1" setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\setup.exe.\setup.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
- System policy modification
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD58be20144dbd200c6de0c9430ed9280cf
SHA1b81e3aacaaedd66ef0896acabc6983c94758e2b4
SHA256634557ab79a29fe800721bc5f146a9b86799b72eb6755e821492f85ca66818a6
SHA512fd7db954002be6332c8c6f4500fc38c1d5286022bb56f21b97567e837ee3d5a3c6db08cabcd2ffe405e7180918d6bb0b57b330703a9d045851901d01115ff94e
-
C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\[email protected]\bootstrap.js
Filesize2KB
MD545ef3fd7a0a271a25309e3e53ff89021
SHA162c9c7630d31acd60f03dd3c0276cc1edf98a8fc
SHA256ebab0953e71a77d5a6f87f1cdb39a6df3a15d87756514960c71b81c7a6ff19a3
SHA512020c0872ac02db63ec36b2dd992647f9beed33c59679b91228a6b133908444acb04a8d86f2a1622c435235f65e43a61bfb18a4a4e5f0ad53b2b30f02a33771b4
-
C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\[email protected]\chrome.manifest
Filesize116B
MD50c56c89075dea8b026206639f5d640f8
SHA1c6dc859e4e94271ec7c67ff84d406916d46aecf2
SHA2563afc44159f000b37ce0420bf495e623136edc2aea4e099741e848cd8fdc62749
SHA5128efaf7f547110f62b880cd9d2dec309cdd8b84fae46d9a247479e13a08b5616e807b52e774ff6ab0a1cd171f1d3ec6253e2dd5ab4d9ce1f149bcd2f80bc69617
-
C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\[email protected]\content\bg.js
Filesize8KB
MD5295242210b0b383d96af27d9c96a45ca
SHA1857dfa2cb30ee315545e02bd3645cba152edd73a
SHA256a3bc59b8739ecfc3ab06330957d4f9caf89fd292bd46e3c257eaeb477c028903
SHA512451d8071ceeb7abe6c34316577bd8c5169548e4a64b045130d5e74454b57cd9e002ea5de26d9b7674379d155de0329c101b0b77030f27deb24dd242c6d224730
-
C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\[email protected]\content\zy.xul
Filesize225B
MD5f4dc015292658b6c2f71253ea3915542
SHA1c840db59eddcded24c6d1c8f0568fd2fa6778f87
SHA2561cd34568f9fdb5e46777f6545c0278f2c258b61e17970f030ec7a0038e4a1bce
SHA512e8b62b9ab05b445f24b71fdefcb8070ea9d2f9efcc4dc4b62af64bc1fd1c38737767ca25affee2f1714c22973b5691cade62d5d0f2b5311cea42909ccacbab3e
-
C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\[email protected]\install.rdf
Filesize714B
MD5787b9228dbadfe26ca13a2ed2d6eb023
SHA179bf0c08353ca53bb667d3308e64feb69a3f01b8
SHA25678de170388ace399be286fcb0b886da4f081a656312714befb8f498bf468de39
SHA512545879328c3d21abf4cdee70e01fec6015d7b65e0e7beaf7ce460b31aad448dc73330c6dab49a10ca8705a8894c48653ca110f8958c2b27deb7b57a8bb9cbac0
-
Filesize
4KB
MD520dc347c38318ac686d0ccfca0b495a3
SHA1314b30731d305a0bde6a5116348173ca8d565e41
SHA25689fc71c7cad6d73cacc5946789134644c5ba4d16900d963fea3a687a569e8b7d
SHA512c2a91bc7072547f110a514eda68a5cbe618ec606784448a43769b94767c227383cdf3d1b7c9d623e93228f2e2e026003ea6977308c90afc7d9201689195ae8e0
-
Filesize
139KB
MD54b35f6c1f932f52fa9901fbc47b432df
SHA18e842bf068b04f36475a3bf86c5ea6a9839bbb5e
SHA2562b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196
SHA5128716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99
-
Filesize
391B
MD5b0aea84419477a53cd44819bd1673629
SHA18cfeda42e2e078abd9f2d8b16550738c6426c4ce
SHA2566bddd07e79b030ff0a9832604f24d62158f248420606b16517e72cf7bd05acd3
SHA51288d67df212e2b8d8cbc8d3f1c9f75cef6e296117f6bebc21f16f6134f87a2488d58a9e79996b846a8ed34162cffc47292e108a765dfb51fff92c77f479230a61
-
Filesize
3KB
MD56e0b8fdca3d9c9ff0580261b9fd96f7a
SHA10ca36d05abbacceecb01f151d50dc8d24ae7dec9
SHA2561d7c449dccff8896ca33e42e9194720ea88cf988e1dde98936339c3d3d1c6a4a
SHA512f8e117d6efa4b881db832b68a534aa9d04af74cddbade5b966c468ae16245c835763115c743530fccb10e7cf83fb8ae06f0c9f65cd888d3f31e2fea4894ec969
-
Filesize
660B
MD5596e845edbb6e4455a24f374d5b2e298
SHA180e252f99f9d8ffa3ccd44af17d22503954bf785
SHA256d5dc5175972cdaf89fb6522345974cbfdd1e295985670d5bde54784a7d8c2514
SHA512244e39910d9349f0719f5f78d1fbfa5b0b6c859b271cc9564fa59be50e65ff6905a65f0d66178d607e0a0aa146ff9c86bd367ca48cfba02d4a35f15fc594228e
-
Filesize
61KB
MD516ef6e914973925977cdc5ef6b8b2565
SHA14815da2815975b33f5dc94d482e6dbc02588afa6
SHA2566b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f
SHA512c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059