Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 14:37
Behavioral task
behavioral1
Sample
3a9f0dd8d0645492c815890a76e5ad3e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a9f0dd8d0645492c815890a76e5ad3e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
3a9f0dd8d0645492c815890a76e5ad3e_JaffaCakes118.exe
-
Size
56KB
-
MD5
3a9f0dd8d0645492c815890a76e5ad3e
-
SHA1
14574fd766bd7257f0dd9616362f6114a97fae24
-
SHA256
dba31ba17f5fd314bdaa69df902db653a5b0a6ede5d53459573c7ca6e868095a
-
SHA512
ceeaeecdec572d92bc8e2b69f6d22aeb67eee825c428a7d498cfa48b914d91aa82bcd129084d82e5df81c9029cbabc77434ab1c08ce4936207ff8b0b32187bb1
-
SSDEEP
768:1KKJQABuxDyQu7btsfP+DANJnZ/T53Qmrd1NoA1DleQ2T:1Z6DjmYgmrdUA+
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x000d000000012262-6.dat revengerat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe -
Executes dropped EXE 1 IoCs
pid Process 2684 Client.exe -
Loads dropped DLL 2 IoCs
pid Process 2408 3a9f0dd8d0645492c815890a76e5ad3e_JaffaCakes118.exe 2408 3a9f0dd8d0645492c815890a76e5ad3e_JaffaCakes118.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\intelCPUdrs = "C:\\Users\\Admin\\AppData\\Roaming\\Client.exe" Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1996 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2408 3a9f0dd8d0645492c815890a76e5ad3e_JaffaCakes118.exe Token: SeDebugPrivilege 2684 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2684 2408 3a9f0dd8d0645492c815890a76e5ad3e_JaffaCakes118.exe 28 PID 2408 wrote to memory of 2684 2408 3a9f0dd8d0645492c815890a76e5ad3e_JaffaCakes118.exe 28 PID 2408 wrote to memory of 2684 2408 3a9f0dd8d0645492c815890a76e5ad3e_JaffaCakes118.exe 28 PID 2408 wrote to memory of 2684 2408 3a9f0dd8d0645492c815890a76e5ad3e_JaffaCakes118.exe 28 PID 2684 wrote to memory of 1996 2684 Client.exe 31 PID 2684 wrote to memory of 1996 2684 Client.exe 31 PID 2684 wrote to memory of 1996 2684 Client.exe 31 PID 2684 wrote to memory of 1996 2684 Client.exe 31 PID 2684 wrote to memory of 2656 2684 Client.exe 33 PID 2684 wrote to memory of 2656 2684 Client.exe 33 PID 2684 wrote to memory of 2656 2684 Client.exe 33 PID 2684 wrote to memory of 2656 2684 Client.exe 33 PID 2656 wrote to memory of 796 2656 vbc.exe 35 PID 2656 wrote to memory of 796 2656 vbc.exe 35 PID 2656 wrote to memory of 796 2656 vbc.exe 35 PID 2656 wrote to memory of 796 2656 vbc.exe 35 PID 2684 wrote to memory of 2864 2684 Client.exe 36 PID 2684 wrote to memory of 2864 2684 Client.exe 36 PID 2684 wrote to memory of 2864 2684 Client.exe 36 PID 2684 wrote to memory of 2864 2684 Client.exe 36 PID 2864 wrote to memory of 2908 2864 vbc.exe 38 PID 2864 wrote to memory of 2908 2864 vbc.exe 38 PID 2864 wrote to memory of 2908 2864 vbc.exe 38 PID 2864 wrote to memory of 2908 2864 vbc.exe 38 PID 2684 wrote to memory of 1812 2684 Client.exe 39 PID 2684 wrote to memory of 1812 2684 Client.exe 39 PID 2684 wrote to memory of 1812 2684 Client.exe 39 PID 2684 wrote to memory of 1812 2684 Client.exe 39 PID 1812 wrote to memory of 628 1812 vbc.exe 41 PID 1812 wrote to memory of 628 1812 vbc.exe 41 PID 1812 wrote to memory of 628 1812 vbc.exe 41 PID 1812 wrote to memory of 628 1812 vbc.exe 41 PID 2684 wrote to memory of 2052 2684 Client.exe 42 PID 2684 wrote to memory of 2052 2684 Client.exe 42 PID 2684 wrote to memory of 2052 2684 Client.exe 42 PID 2684 wrote to memory of 2052 2684 Client.exe 42 PID 2052 wrote to memory of 1220 2052 vbc.exe 44 PID 2052 wrote to memory of 1220 2052 vbc.exe 44 PID 2052 wrote to memory of 1220 2052 vbc.exe 44 PID 2052 wrote to memory of 1220 2052 vbc.exe 44 PID 2684 wrote to memory of 2104 2684 Client.exe 45 PID 2684 wrote to memory of 2104 2684 Client.exe 45 PID 2684 wrote to memory of 2104 2684 Client.exe 45 PID 2684 wrote to memory of 2104 2684 Client.exe 45 PID 2104 wrote to memory of 3012 2104 vbc.exe 47 PID 2104 wrote to memory of 3012 2104 vbc.exe 47 PID 2104 wrote to memory of 3012 2104 vbc.exe 47 PID 2104 wrote to memory of 3012 2104 vbc.exe 47 PID 2684 wrote to memory of 1036 2684 Client.exe 48 PID 2684 wrote to memory of 1036 2684 Client.exe 48 PID 2684 wrote to memory of 1036 2684 Client.exe 48 PID 2684 wrote to memory of 1036 2684 Client.exe 48 PID 1036 wrote to memory of 1752 1036 vbc.exe 50 PID 1036 wrote to memory of 1752 1036 vbc.exe 50 PID 1036 wrote to memory of 1752 1036 vbc.exe 50 PID 1036 wrote to memory of 1752 1036 vbc.exe 50 PID 2684 wrote to memory of 2652 2684 Client.exe 51 PID 2684 wrote to memory of 2652 2684 Client.exe 51 PID 2684 wrote to memory of 2652 2684 Client.exe 51 PID 2684 wrote to memory of 2652 2684 Client.exe 51 PID 2652 wrote to memory of 328 2652 vbc.exe 53 PID 2652 wrote to memory of 328 2652 vbc.exe 53 PID 2652 wrote to memory of 328 2652 vbc.exe 53 PID 2652 wrote to memory of 328 2652 vbc.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a9f0dd8d0645492c815890a76e5ad3e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a9f0dd8d0645492c815890a76e5ad3e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Roaming\Client.exe"C:\Users\Admin\AppData\Roaming\Client.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 4 /tn "Client" /tr "C:\Users\Admin\AppData\Roaming\Client.exe"3⤵
- Creates scheduled task(s)
PID:1996
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\eyzkk0ag.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3B0E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3B0D.tmp"4⤵PID:796
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\iajkokzt.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3B8B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3B8A.tmp"4⤵PID:2908
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\uqzjrhtq.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3C08.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3BF7.tmp"4⤵PID:628
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\nmkjfrm7.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3C65.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3C64.tmp"4⤵PID:1220
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qoqmgmt1.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3CD3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3CD2.tmp"4⤵PID:3012
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\v-zsfpug.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3D40.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3D3F.tmp"4⤵PID:1752
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\3jflikpb.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3DDC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3DDB.tmp"4⤵PID:328
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hcyn7v3a.cmdline"3⤵PID:1156
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3E39.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3E38.tmp"4⤵PID:1656
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vnaipcgr.cmdline"3⤵PID:1384
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3E97.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3E96.tmp"4⤵PID:1060
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vwgyujbt.cmdline"3⤵PID:640
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3EE5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3EE4.tmp"4⤵PID:2228
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD5f7679dae33cc7cba76ae134efab4ca27
SHA1ed8c202c43803fd6f4a2b8f1696688ad54d4f5ca
SHA256fab275ee64ff822b7e7e5089b4499813aa8a1ca44e499906e418e5db142bece6
SHA512ca866b797ea7f1a2a7c3788e1944d285668f7256512bd7f43fa1302d6b4c5a342fa98b5213d1550685f972060ddc6da5843dfd7ee0151a981eb73e48b0314abf
-
Filesize
171B
MD5b93fc1831f7872d7603bb6bb14c94c3d
SHA10af13fe4af5755abd81d08fed3fdd1fe87a228b4
SHA256cc62e07687566eb63b2e973ad44989a9036a719b8bf85bb9608102060fe3609b
SHA51201232b6d931231ff4d6b0f8f1570c0a881f8ccfc325fad2991a2ba180647974ad8492ccd867ebb99db065add211392f8c5e694b96f15936452d29946b638cd98
-
Filesize
1KB
MD591d5f1a5a4820cc81f60e6a2b29c13bc
SHA15ce946eccb5bf1045325ab1d8b931ef5387d71e1
SHA2569bc8d2f766106f6ba1241b519d5c323bab99fb5e398133746215a9617ac44304
SHA5124453b9bd5399828377b758cd1b7efe6525c589eab12ea36b266fc935ae04df989a11a2243533527d6b3a115e8b06ffa680897ce8f16111a7f4cdc607f1daa5ab
-
Filesize
1KB
MD5cb43335ecf549b98b9c88dbc39b74ef2
SHA12f1a6253a247b8e29bb1366638e8a20fe4f7a294
SHA256c9cde7bb1fb1dd50a0564353a5e2b679af78e972aae8000b3bcad98764f27eb3
SHA512bf27d83b50baf50f42265afbfdbd4994f8da47e6ec28e36ded930ae95d75257390066201dd5863a7f233b3922596103f312b2bd3230c39505f13fc2562b784bb
-
Filesize
1KB
MD558ba25598d8ecade3ba18e0989aab87d
SHA100607100af021ccf22ea153cab77993406ea1bc1
SHA25626e27c9647efd1ab1d94043ccacd28aaf000b676230c80821d896e52c7079847
SHA512e2b383cbe4beebd2b566cb223f591797694c8a11622beb167cf3aca98fb3b6032069e555aec60fdf12b0be070fb922b0f5ae8422b1bcbcde372c3239e07169a0
-
Filesize
1KB
MD5289d710890b5ef8093290b727d1613b3
SHA11cb05ea9be9f20bb9a9efe12b1fe27982ac5256a
SHA256c5f2e5135c58c9d12c217a638340f8bc81f5ca7965b98403a9b6f419a7afeab1
SHA512f3df268fe1c73d8d043f0a066987b6910ef72979e2fbb9fecf1c5b37445aaaa646a05fd64c6a0834850707db3d6159f440ffb490ab51635f9096e62b62e339a1
-
Filesize
1KB
MD550f6a2a274f2097d388510c2570232ad
SHA13770ea92203156346a1fc73a470d57258245aa94
SHA256f8f79ee5c753c40bc310a585b5ada18d6006bfa3288301ab423e6ea637a013f3
SHA512c2df68946a5f5f6a9f0e53fb85581a8a3c68aebd101bcbca50be96cd279488e29a889faa044a7d59f92585fde98f8965930671cf97b032dcb244a867c5d08ee6
-
Filesize
1KB
MD5fae15132101a32c569baa3f88c8582f2
SHA1250c872e23ac32f415c65725db0c9fb1d2d93a1b
SHA2568556a05fa7deb207a3fa41f662e8868ba12b3ff86583c76267a96c3141a346ad
SHA5122e8224c74dbcd47c83362d5ed7ac4076f6c5e9f02c743144614b49c19dcf9f56700241fc04e0ca7af31c403239a5fbe201999de1423ef92b4d29df9cc07dcbfb
-
Filesize
1KB
MD5d27bf5b11a4ae9988f6f3d3bf1966a45
SHA16dc33f885ebb212230c393c1525996a05d95905a
SHA2569e547d5db3125ab16f585f260b331d26536b1e923f4221749fbc56da7e35d61b
SHA5123d4117ad857d231aae52d55ebe951d38f543448201fd2b9bbd21556f20cb67d69baf9183e3b979dc0970ecbbd2c193c7af76c22dc0ddf0105b5bf1be2a252db1
-
Filesize
1KB
MD57deb598291135997ab7afac9664300cc
SHA1d6f9910fd284e2e70058c562aa9b143f8a9cdb54
SHA2563009023ebf6bc9095478ef4ece1709c5b637c3586e81473ebc5f4a336d63b799
SHA512f07f95208141b90aa39f7f52162222e9ee0cbf776c03fd2d4f7aedca8648b8ce2b3bed016788af3c26619f3babe0674c4efae7649c22c1ddb9bba84efafd0949
-
Filesize
1KB
MD5a55bd0f924647c38c7b86596e5c9ab3c
SHA128676b3334a5b787e84af9452b8c9437d0318e26
SHA256c98c6a670abf9f065432063bcf97ff705f5b771d7c5cd71d4987b7e6802616ba
SHA5122e4051fe050dd472b885b6701a60494b3e5740401a83f8a1c857d929626a949b57a5c51b85f33bdfb17d526448f371659461babd83347e3022d65c66b23eb0eb
-
Filesize
1KB
MD5966869569d74224defa33c9c03f9c99d
SHA10258eeff496396a631b2952af2975531323fc4b8
SHA256c984190e8c0a7c56a3c71c9cd5aa31098c4418c7457d41a745af957dbdb282bc
SHA512656119c6a499bf06056125903be8f522a8c7f1c74a2ae5ef79bd2a978e9c1be3901a391137017726cfbe6a747e75c2755932a6ae74840ef04113eda89ddd1a08
-
Filesize
267B
MD5609a4cd82d67d1ce9aca793b13b42730
SHA1c7f887785a1b5fa6a5539b6af35312c68faa5a5e
SHA256bf33f6b6853f80036fbd9341d045d4ff16de08265defd95bf5627ee88b0098bc
SHA512f225c736217c8b7ce465afe5abb7205f76596dd995ac871e5faa8dab62df2623351c0ed325f8aad20062e34dc76b4be944541e33f97f7ca4079fba314e02f269
-
Filesize
162B
MD595ecc6101baf06aaec97facc44528674
SHA18c316fe3833483abe8d5e68f53680ab09cec293d
SHA2561d6b1eb53c05a9edb364e80c158a460cbbacdd35d10670e68ddcf4cad604445d
SHA512cf793ff09382bbf287bbf0a2fafeb3d5db353e9ac6a3d2d4489c20245ef90417b0fd9ce7d2b917a61e27b582f88c071ffd98a2e6e961e815dfb2ec73e31d4484
-
Filesize
269B
MD590d81aed5c4b667da6b922307116b9c4
SHA1de91efa1470a0c3b58d7f55dbfd24d772940017b
SHA2561c71d7ee4d6ac941777c876f1fa230e885c583ae88401c58cb33f791de50a623
SHA512ee90ff2809b8b264772e6c9ada0ccdbc0eb2e88dcd606c0e1bd724e69d4b3d735a55f2b73fd14be1815528a70f6e98a61221af130b4b20cdef4057e98fbc187b
-
Filesize
164B
MD582cf244ec4e0b080fabb6d733d2a70f7
SHA10c691c3d9315c678da90790bf335971185fe1fdb
SHA2568f6a97667d50c2c3c300d44b752405438de9dad4f72d84c0900f26f56da7fbfc
SHA51254151658044cfad2034a385dc06dd58d6c2e6c7270a0dd30760ca8b4000402721ab9baaa43cb0aa9329603e2db53c350bb83300b4cd9eedf0ce06175adf18e42
-
Filesize
271B
MD5fb997d8a1180a8f99c6c195040b15549
SHA108903aa6027362203f949f25b4635eb99b3c431c
SHA2562590e2fca6f7e18bdbd16be875011383d5911118988883b91cb4b740560388ab
SHA512e917e6c582633ccd7833af8ac5cdae7c52dc78057a03ed04d01a9adeb20e9eb7c84158558b06e6cb30f2a98ed637913b4b269c53f32842bcbbfe740115e494ba
-
Filesize
166B
MD59495932cdcef294e33e906a13e45e902
SHA1fcc07686dd5e56d9504057d54b96429e1d0bbe08
SHA256944575598df00707c56e562513f82d411a22433d3e8361f6f5598ae2db8da91b
SHA51267948d1906d5292e68163c6c3a8c02aa57e2e0c5354f04b5e1453e799b4bd9e6a44c56bf123d8e238177a63b6636455626f256613d06f70a804ece5b3d06e907
-
Filesize
274B
MD53d8bced72590fec617343a53a5cc21da
SHA11c8b158dab58e593e92ca2a2a625c60952b7d40e
SHA256db074cddb8e6ec7352de0fc0f86d508138dd076a904fae6198aa414f618af077
SHA512b6ea51dad718b2f64d451552fcb02ce69b7c7609c6dfdf2571544d5deae7234eab072c775500f3d271c9440d4b99197fd230b47c8452fc1176a62ff50b8b12ef
-
Filesize
169B
MD5e6550f48a7f43007f058236f2fe7e87f
SHA1e49b9f6da8a2cdeee00613d6c8b8696774f645d6
SHA25612fef08022906f00d5b767b0dc08d813bb68429955a23cf2f0a828344f531695
SHA512ac53375240a747e0e3a588bf7f3c14d9195a31ed1eb96ee70b3bb83212a326f2dc39e376fdfab9105b9034ed5674d19fc673b09c1053110dd16f23999422e722
-
Filesize
276B
MD51909af250b6678eac754defe533b683a
SHA147924abd4aa9802aecf533c8ab43e714c31a82db
SHA256686c2abe526e8034d124801a8bd2f22faecd1b2af297560c905f3b6ffa3872a6
SHA512f7014e8f8faea2d1d16654ae4db34bbb5aae8d6dcb6a0e27e60a2905b10bc57d01cc7298626e42702f91d9aade60201a2e54df4992067d2802a8f16fd50cac5c
-
Filesize
171B
MD5e6497b9623b2852d66660f3913a06916
SHA18fbabc027cc518c096956823a2c68830d3cfe834
SHA25649f876daebe4ae7ca97775cdb68e74594beb35377ce5b06c3b88a8c2abae5633
SHA5122940c465b671d2bd11593400d0d8a32f65ccc56ee17f6feacebdeb623f04feaf6b8886ca615dee8c25a92f372b21444b6bcfe73ac62f159e2ea63c9363009b38
-
Filesize
270B
MD57edffcfb4e6ab93f89421cc7a8fbd0b5
SHA1d85f319b7695cd4193246192791a6eb3d12652c4
SHA256586797ec79b1b8f75ec6d93b15c21c7fddfa005a3072a8a96a56a2b290d69454
SHA512afa80ad321c55a93a54f54d6cf77fbf9417e0f817f2e112240e37acbbd73992342e59c8caa6e809b8b653db843fea9f09464f28c45e5f6e740b153d8bbc2fe84
-
Filesize
165B
MD5fa4628d32ccaea68377c1ea9ac2dced2
SHA1934b07ec109bde7f79e7c083dbd9cd0f77f910d2
SHA256f9f3d095b651a87e76d5700c4780070a5d7e0fe0fc718c215ff914d8caf62a0f
SHA5123dc97f71379cec8128b0f5c5db017daa6f53db61d20e7e4c50c8d14d4231e8ff5999db5269c00961bd0c38dadd03a5c712719c16590db66f840d095aa0587b5d
-
Filesize
295B
MD548d462e4c54cc205f665fb524963485b
SHA1e23300cb1fba3d4c5a1dc4a355196e924c3cd557
SHA2565a1a556ec49339cb8e43281aa4bbe969fa741e39cba84586a39849f25381607a
SHA512d30670afa8f9c9f006015940314543b4b527eff6a9ca151a9c6498df1688ffde044dfc285d1dc63c72f3663263afdc6fd4982066067c0b1bc1c623e2963e1530
-
Filesize
190B
MD5ff7d93912bf5ce5c1821481c142756f1
SHA19fcba6ad36d902b694a643d335916f292331e356
SHA256688926ec4bacfdc9de930f1c00f91c390e6daa9a48e606f090a82a65ba6a4f7e
SHA512c9ca099f3436ea7bc844e1098d0441e7b7783fb6e86ff28b10ddd0d6520ba4e36da9be3b077b1c53487088f5e9503d1720688d2a4ce2479bf02fcd69710e41e8
-
Filesize
668B
MD53906bddee0286f09007add3cffcaa5d5
SHA10e7ec4da19db060ab3c90b19070d39699561aae2
SHA2560deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00
SHA5120a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0
-
Filesize
684B
MD541857ef7e71c255abd4d5d2a9174e1a6
SHA195051d6ae43ff1bd9e5ebc95aa2e7b7c3165cb6c
SHA256dfcdf12316f3b523895ec611d8e8d9fdc189ab8dde4e86fb962541aeac54e302
SHA512ec6c5a7729d273be3ff194ffe47056731ab4100e298b7f50108a2599be59c84bd1953a90c4d7390c477257986a18d336d951f590b782f1aa983de7bd4c86e6ac
-
Filesize
684B
MD5453916f7e3952d736a473b0e2eea5430
SHA1b79ccb2b555a81b8db470ec9fcaea26d42ef1c8b
SHA256b0f8b94a35a12060c70e9f81641be22cbf1f1794c73260f48a2e6e46608623fe
SHA51286d32a03cf04ef8640075c82e5fecb23034413a41b80b81c900a423b03f44589f774f68f83561465e7c9ce46512c818eef5a90e5ed9f7b3f86b592be34fa367f
-
Filesize
700B
MD56ed26221ebae0c285cdced27b4e4dbac
SHA1452e9440a9c5b47a4f54aefdde36c08592e17a38
SHA256aacdfb10fa949c74577bb1778fe2f3bab88b3e587c07cfffb003e059097e9e6c
SHA512c604368a7b4adfbec5b6898c8880ea684bd085d967c1ebd087c9bed065fe3e2575c8298a9ccaa454d68496386667db998e2a04248dda2ab35905c8a9b1135cce
-
Filesize
748B
MD5b548259248343e12d417d6c938cf8968
SHA119703c388a51a7ff81a3deb6a665212be2e6589a
SHA256ab2ce0a14c78f836d2b134a37183b6d89a78b964ea5607940fa5d940d32a0366
SHA51273a3902f000a042a448446f6851d6ad61a30bfdfed7d7903b5dad0f368ee43cd6da3b8ba817ac95be1a7427902aba0642af8ccddc4d442867465f1f1f5bf6f81
-
Filesize
676B
MD5ba2c43095c1c82b8024e968d16bee036
SHA141ea006dbc9f0f6e80941d7547a980a1dde868e0
SHA2561209067183104b41f03a5be0f377dc1865155cc84bdb509b871b7ce3366aae72
SHA51200dc93cdb8c4cb0a681f99d24c59216a721bce963d76bad972e29cf92aafd74e4af46632c00f5aef4ce3160927db9df8aa9a8926ea4a5cb6974b499785569e61
-
Filesize
644B
MD5dac60af34e6b37e2ce48ac2551aee4e7
SHA1968c21d77c1f80b3e962d928c35893dbc8f12c09
SHA2562edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6
SHA5121f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084
-
Filesize
684B
MD57a707b422baa7ca0bc8883cbe68961e7
SHA1addf3158670a318c3e8e6fdd6d560244b9e8860e
SHA256453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c
SHA51281147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9
-
Filesize
275B
MD58bbdf77f7fb547c34b1f545d80a0d999
SHA17a0d021f50d95e468ed54468f21121a8404dad83
SHA256f220c2038fa037c3f1f049dbcd2c28b90f23d7cea9eaaa72da5dd2fa20e2d00c
SHA51211de523e7900a7218ad0b7b74606970a981e445c68c8be1c26213c9a70a4e2617ea1730209a0daa5e255349b098cf00d5546e2473005a873cf3f00d2aeb75fea
-
Filesize
170B
MD571009aa190e254b37700b6ce0ea8185d
SHA1c4dd4560f962cdeeff17358c3c717ae48941b1ad
SHA25635eb8bc878ab4077dffa97d2d67a67add2e17f57f0c9382f664ff328bf58f68e
SHA512b0278f7e7e52a48e8d2d4cc71fd123088390579ead56cb9b53def2b79359607e2bb21a7106fc40b5aabf2ae68d5107b3dc4c36284ea8bdf572d36c715b8f969f
-
Filesize
278B
MD5a1e445c98559ecb711e61ded02367229
SHA102dc3714779ec2058608a2caf87c7b5019c1d9ed
SHA2564913525539ef3077c8fb17e7d5ba2537ee79ce17179178ca2777f87847010aa6
SHA51226f0589fc6f579892e0cb53fe5e34b1252b01ef42cb9ab7e9c62ee48e45d71b8814fcbd5b468db7fdd3d62914a0f09e2b3a07261e1ef9acf25db5eaeadeb9ac8
-
Filesize
173B
MD5ab34d70e8358d7f5e9affc984f836cca
SHA1af20fa98d4a8435cee2ce9ba1b8779bb45987ea0
SHA2565bd9edb25c3404be004adadca2edb34dae2aab69a7deff33f4e7e6d3194e4500
SHA512c09440a8b9b6bc8409275d5f9c17e4f6f206172218e8c83f98d6eeac7bcdd0dc084be43287960b32095e0b52701a0563382c33af7c67020f0a1e5d3175ccc664
-
Filesize
56KB
MD53a9f0dd8d0645492c815890a76e5ad3e
SHA114574fd766bd7257f0dd9616362f6114a97fae24
SHA256dba31ba17f5fd314bdaa69df902db653a5b0a6ede5d53459573c7ca6e868095a
SHA512ceeaeecdec572d92bc8e2b69f6d22aeb67eee825c428a7d498cfa48b914d91aa82bcd129084d82e5df81c9029cbabc77434ab1c08ce4936207ff8b0b32187bb1