Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/02/2025, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2a35642138556dc206c4efb089250b6a.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_2a35642138556dc206c4efb089250b6a.exe
-
Size
255KB
-
MD5
2a35642138556dc206c4efb089250b6a
-
SHA1
83426cbe66a2a1e15f198611f5d614f0525a3e91
-
SHA256
12b2d1bd1d8fef8e0263f7a2a17d938579be47c6c03bead0a18a63dbd1bb5bd8
-
SHA512
5531e3ec4460c7d4ce87df03c7fd661b778b2225e04420f1d32d64f6b5475536b95f70e311cac8a8d0a2c9be926d16c3d8a9da77ee5b6f87970d95b3c414e795
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s516lRduaFmL4JU0zfxr3Agl:h1OgLdaOUlREaFyaFza6
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00050000000194e2-77.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1668 515306c59c912.exe -
Loads dropped DLL 5 IoCs
pid Process 2844 JaffaCakes118_2a35642138556dc206c4efb089250b6a.exe 1668 515306c59c912.exe 1668 515306c59c912.exe 1668 515306c59c912.exe 1668 515306c59c912.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nldnmombedifpfihapabfmjpcaoheaba\1\manifest.json 515306c59c912.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{49B02043-0A00-6209-D425-691BEB3C534B} 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{49B02043-0A00-6209-D425-691BEB3C534B}\ = "Boroowsee2save" 515306c59c912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{49B02043-0A00-6209-D425-691BEB3C534B}\NoExplorer = "1" 515306c59c912.exe -
resource yara_rule behavioral1/files/0x00050000000194e2-77.dat upx behavioral1/memory/1668-81-0x0000000074B70000-0x0000000074B7A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2a35642138556dc206c4efb089250b6a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 515306c59c912.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0006000000018d63-30.dat nsis_installer_1 behavioral1/files/0x0006000000018d63-30.dat nsis_installer_2 behavioral1/files/0x0005000000019501-99.dat nsis_installer_1 behavioral1/files/0x0005000000019501-99.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Boroowsee2save\\515306c59c94b.tlb" 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 515306c59c912.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{49B02043-0A00-6209-D425-691BEB3C534B} 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{49B02043-0A00-6209-D425-691BEB3C534B}\InProcServer32\ThreadingModel = "Apartment" 515306c59c912.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{49B02043-0A00-6209-D425-691BEB3C534B}\ProgID 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{49B02043-0A00-6209-D425-691BEB3C534B}\ = "Boroowsee2save" 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Boroowsee2save" 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{49B02043-0A00-6209-D425-691BEB3C534B}\ProgID\ = "Boroowsee2save.1" 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 515306c59c912.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{49B02043-0A00-6209-D425-691BEB3C534B}\InProcServer32 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{49B02043-0A00-6209-D425-691BEB3C534B}\InProcServer32\ = "C:\\ProgramData\\Boroowsee2save\\515306c59c94b.dll" 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 515306c59c912.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 515306c59c912.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1668 2844 JaffaCakes118_2a35642138556dc206c4efb089250b6a.exe 28 PID 2844 wrote to memory of 1668 2844 JaffaCakes118_2a35642138556dc206c4efb089250b6a.exe 28 PID 2844 wrote to memory of 1668 2844 JaffaCakes118_2a35642138556dc206c4efb089250b6a.exe 28 PID 2844 wrote to memory of 1668 2844 JaffaCakes118_2a35642138556dc206c4efb089250b6a.exe 28 PID 2844 wrote to memory of 1668 2844 JaffaCakes118_2a35642138556dc206c4efb089250b6a.exe 28 PID 2844 wrote to memory of 1668 2844 JaffaCakes118_2a35642138556dc206c4efb089250b6a.exe 28 PID 2844 wrote to memory of 1668 2844 JaffaCakes118_2a35642138556dc206c4efb089250b6a.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 515306c59c912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{49B02043-0A00-6209-D425-691BEB3C534B} = "1" 515306c59c912.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a35642138556dc206c4efb089250b6a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a35642138556dc206c4efb089250b6a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\7zS8A17.tmp\515306c59c912.exe.\515306c59c912.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
- System policy modification
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5f3c79bda3fdf7c5dd24d60400a57cadb
SHA11adb606aaeedb246a371c8877c737f0f8c798625
SHA256a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935
-
Filesize
115KB
MD500ce3831a16a62c6d7ea4b21049e4b22
SHA13e48c8d25b196d67722ed20cd36bf3448a4c9136
SHA256d4bb7937b36973cbf3b12c9500c25ed34103944a69bad9162f3b98f39474529c
SHA5127633071b26d802aae1250111baa40e5158fb1a1639d76098f2ecd6263adf0e6371d5e9a70d9005b267cb907da84235f4e361f8c8a75b8adbd19a049ab1227619
-
Filesize
18KB
MD5d5980ff8eb0ef4276fad96fba8fc5018
SHA12cb05f8b43aa3ae2f5492f590997eec6ff808fe2
SHA256ac3a1daa32b1c489f9c2f4413ab35c4fc90b54a52ede0fb53276666e6eeef16f
SHA51230404f467dd727a7de132fb08cd3c88abf5fb2e7ef18f24af5371b63fd106d6d5757061ec55c7b54daf9844100280670bf2b22a71c89b160048552b5eec12d0c
-
C:\Users\Admin\AppData\Local\Temp\7zS8A17.tmp\[email protected]\bootstrap.js
Filesize2KB
MD587898d6bd502140382ce2339b652c2e7
SHA1a04bf9da0633d2e98ed04e7dec6e026899ebd29c
SHA256a5f0030d621bdfa30f293121c65d65f7645e27a1a69ec145251a73e4c3cdfeb4
SHA512775b0b057dc91ad183a017a257b336cfd27cf14498e951666252969a6324e987c3b6152aca8b76544ce21e7275561b7a0b65264c1cb92c67b7174525a4ce0578
-
C:\Users\Admin\AppData\Local\Temp\7zS8A17.tmp\[email protected]\chrome.manifest
Filesize116B
MD57ce86e7f081dab71b66ea7625477ce6f
SHA1470f58adbea08dcc8cd17fce814b9564455287ee
SHA2563467f9b0009f721ce58685f4d4a14c324cf2be198743b9ce8a84aff20ae14c35
SHA5127c416a6f6aa8d96c7b6ff8a9d833c7bf0eadf6260b6fc1498c5372ae34634d5d90e4d4c0fb2e734c6610635bca7e8ff2b3f423be29f23caa057eae97e3a6015f
-
C:\Users\Admin\AppData\Local\Temp\7zS8A17.tmp\[email protected]\content\bg.js
Filesize8KB
MD5d5299d984463a5bd4b3f747168ee10d8
SHA1e36002e936aa754d7dc7e3aff939513ff8b62f1c
SHA2566ba6697b04ca42e38e3efe5218de69c4eddd5c1ea9bee50f89b8940bfeea0369
SHA51267fb8b227752908e90bb1880553853ddfd0da881c91c03bc4825a41a63002a06e6af985e74c43dae3870bc923277a9859fb522d6f0399af907091ffba49ef83a
-
C:\Users\Admin\AppData\Local\Temp\7zS8A17.tmp\[email protected]\content\zy.xul
Filesize225B
MD57d2db36b90a73614caa4faf127bb3ec0
SHA187614039600aef2e6daf8cdb3c3bc908f55af42f
SHA25642762eb6dcb3726ad8caaef525a9c8120c1a44b741c1299b3269f94bb39683bf
SHA512b30737d85d0a5bbfd09f9accf0a9c6ea67a2f6d851b4ccdeee16065c215426b2b84ce7da9778db73d791536724d2bf5d3690c590fa897b9ee38b84cb06cd6059
-
C:\Users\Admin\AppData\Local\Temp\7zS8A17.tmp\[email protected]\install.rdf
Filesize609B
MD5818e27bc6f9c20868155082814d4ec10
SHA12611dd4bf26ad96605ecc7ca691f9a46e658c00b
SHA256b0dc5d1038d213e9585318203b8703d73cb04f8a6319cab6ff37e81a1285cf0e
SHA51231db6e272aaa369d0a507656442065fe3abd1076d9d06dd6a81fd8639f61e3df1ae6a1f138e732b31114ccd7352fdad3fefe06237e36212b2b182527c6aada84
-
C:\Users\Admin\AppData\Local\Temp\7zS8A17.tmp\nldnmombedifpfihapabfmjpcaoheaba\515306c59c71a3.38136936.js
Filesize4KB
MD5e324a329da7b109e8214c15c645f19d5
SHA15adee0e90125ac28c5bb71b274bd5a7cb79705d0
SHA25696c363fb47f24e4e0b930770595cc465ef95040e929a64e6abae98f9b818eb4a
SHA5129519a529288d79512c7f5f9aca30e5d11f14f232831346d39a34ffce8f9792d0faf97b3d9e46a48a8a6ee742761d18d43d1dc60f8885cf8281e72f9f1362e196
-
Filesize
161B
MD5c5a6f73c19e133745db0a01282bf645a
SHA17d8c58b9215e427aad1fd2d219208972d394fe0c
SHA256108a7597de6021d4311fe595a29d50af04026335ffe990d1599156c18e320d88
SHA5125a4457014e178a77a649b45bae2c2553139bbe705815ca86ab4c6b30c79744ba4a2bf97fe518fed6216b193751b78e784ac03caf38bdfe944ba085729ef2beef
-
Filesize
197B
MD55f9891607f65f433b0690bae7088b2c1
SHA1b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA51276018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c
-
Filesize
559B
MD5209b7ae0b6d8c3f9687c979d03b08089
SHA16449f8bff917115eef4e7488fae61942a869200f
SHA256e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA5121b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25
-
Filesize
506B
MD5575ede21779f1f485d6fd7dc468e6c86
SHA1cf6f0a5bd80f773b6ce6d3b0a973d2cfe849f000
SHA25682c6799969e05f9e724444eda37f23645d7208ad6909812d1ea3a59f55c76a5e
SHA51263af8bdd0c39bc90c09a6ac8f43af054ca8280d20d80d6a91c69735a124aa48cfe88bccca83493412b4c1983b8bed06f0965da387aeb09f508b597d4187b7ad2
-
Filesize
1KB
MD555ab9572f608c31b9dde895c3ab50778
SHA1482e376c15bacc18d5bd5fcc93794e2bed4ca01f
SHA2560558677857ee9029faea4b9f5573d972f82aff18883c6629a509f2554f722090
SHA5129747eb210041e7f6ba83974919af0d3e2d1119d34e819e97754437cd1dcfb762941ee8b24876e6990cf48fe2a031c9e7dfd62573b57bd649aef9b4344d8d40c5
-
Filesize
7KB
MD51f55f9dec7f30b04ed12d1a8c222c45f
SHA19cc2b51a4ee6e02feef5fc6e8dcb35debd5a1f4f
SHA256c9babca2a6d8b9439a791566452a9b32777d652408301edec4d8cd495a1f78b9
SHA512a6b3e966cd7bb6e54ea5884694559d869d6b9af77e1a759dbefb663a195255e13e9a26614e9f70c12c0a2d8bf66ad6715018a764b90423402d5b1b5197e1d0ab
-
Filesize
71KB
MD5b78633fae8aaf5f7e99e9c736f44f9c5
SHA126fc60e29c459891ac0909470ac6c61a1eca1544
SHA256d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA5123885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90