Analysis
-
max time kernel
97s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 05:24
Static task
static1
Behavioral task
behavioral1
Sample
58c285c3df955356b0de4fd8366aafca_JaffaCakes118.ps1
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
58c285c3df955356b0de4fd8366aafca_JaffaCakes118.ps1
Resource
win10v2004-20240426-en
General
-
Target
58c285c3df955356b0de4fd8366aafca_JaffaCakes118.ps1
-
Size
903KB
-
MD5
58c285c3df955356b0de4fd8366aafca
-
SHA1
4573f3abf225c00fddeb3ebdace7bf77bbe04b15
-
SHA256
0b1f6d6c3d5008efd67b9eeebbea8c2e04a2fe3f9ee5db01004384c1419cc170
-
SHA512
c6eb9f8a638f221000783451e4dc3576836a4a34d842c9e8850e2f58e0e5c82b942f31fba8f705532c6cc85057872b2a059e72b40644fdd0c64c3e4a6abb5622
-
SSDEEP
12288:UlKC3i/930kve4tUwcuVJEb1OK4RtGIyc/ZFvRWwajB16I6WY0aMAnbfMeAoJRxI:o
Malware Config
Extracted
C:\Recovery\WindowsRE\5CF39B-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Signatures
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Renames multiple (6797) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-white\MedTile.scale-200.png powershell.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\dot_2x.png powershell.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-fr\5CF39B-Readme.txt powershell.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_forward_18.svg powershell.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pl-pl\ui-strings.js powershell.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-ae\ui-strings.js powershell.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\LinkedInboxLargeTile.scale-100.png powershell.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp4-ppd.xrm-ms powershell.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\lt.pak.DATA powershell.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\nl-nl\5CF39B-Readme.txt powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\BadgeLogo.scale-100_contrast-white.png powershell.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\progress_spinner_dark2x.gif powershell.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sv-se\ui-strings.js powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\StoreLogo.scale-100.png powershell.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Retail-ul-oob.xrm-ms powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\SplashScreen.scale-100_contrast-white.png powershell.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\fonts\LucidaBrightDemiItalic.ttf powershell.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\IRIS\5CF39B-Readme.txt powershell.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_CA\5CF39B-Readme.txt powershell.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\msgr8es.dub powershell.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\xerces.md powershell.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\lt_get.svg powershell.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ca-es\5CF39B-Readme.txt powershell.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-gb\5CF39B-Readme.txt powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\3039_20x20x32.png powershell.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\MicrosoftAccount.scale-180.png powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\SplashScreen.scale-200_contrast-white.png powershell.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Generic-Light.scale-100.png powershell.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\vlc.mo powershell.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Grace-ppd.xrm-ms powershell.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\es-es\ui-strings.js powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-96_altform-unplated_contrast-white.png powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\Spacer\10px.png powershell.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Trial-ppd.xrm-ms powershell.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\sendforsignature.svg powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x powershell.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Advanced-Dark.scale-250.png powershell.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Reflection.eftx powershell.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.Proof.Culture.msi.16.fr-fr.xml powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-96_contrast-black.png powershell.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\cross.png powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.scale-200.png powershell.exe File opened for modification C:\Program Files\Java\jdk-1.8\release powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-30_altform-lightunplated.png powershell.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Retail-ppd.xrm-ms powershell.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\ms.pak powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-256_altform-unplated_contrast-white.png powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\StoreAppList.scale-200_altform-lightunplated.png powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-black_targetsize-256.png powershell.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.scale-80.png powershell.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\eu-es\5CF39B-Readme.txt powershell.exe File opened for modification C:\Program Files\PublishUnlock.xlt powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactNativeWebViewBridge.winmd powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\MedTile.scale-200.png powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Square150x150Logo.scale-100.png powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\GameBar_WideTile.scale-100.png powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\MedTile.scale-150_contrast-black.png powershell.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Generic-Dark.scale-300.png powershell.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\remove.svg powershell.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubStoreLogo.scale-125_contrast-black.png powershell.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Retail-ppd.xrm-ms powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\SmallTile.scale-150.png powershell.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\5CF39B-Readme.txt powershell.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_targetsize-36.png powershell.exe -
pid Process 4560 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4560 powershell.exe Token: SeDebugPrivilege 4560 powershell.exe Token: SeImpersonatePrivilege 4560 powershell.exe Token: SeBackupPrivilege 7236 vssvc.exe Token: SeRestorePrivilege 7236 vssvc.exe Token: SeAuditPrivilege 7236 vssvc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4560 wrote to memory of 4716 4560 powershell.exe 84 PID 4560 wrote to memory of 4716 4560 powershell.exe 84 PID 4716 wrote to memory of 3608 4716 csc.exe 86 PID 4716 wrote to memory of 3608 4716 csc.exe 86 PID 4560 wrote to memory of 2424 4560 powershell.exe 87 PID 4560 wrote to memory of 2424 4560 powershell.exe 87 PID 2424 wrote to memory of 1556 2424 csc.exe 89 PID 2424 wrote to memory of 1556 2424 csc.exe 89 PID 4560 wrote to memory of 6472 4560 powershell.exe 102 PID 4560 wrote to memory of 6472 4560 powershell.exe 102 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\58c285c3df955356b0de4fd8366aafca_JaffaCakes118.ps11⤵
- Drops file in Program Files directory
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jkkrzamw\jkkrzamw.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES35B6.tmp" "c:\Users\Admin\AppData\Local\Temp\jkkrzamw\CSC983DE544FD1F45E29A4387A0915DE6F.TMP"3⤵PID:3608
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dio1oo2r\dio1oo2r.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3633.tmp" "c:\Users\Admin\AppData\Local\Temp\dio1oo2r\CSC89E62D05F6B4740B82F08128B7111.TMP"3⤵PID:1556
-
-
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\5CF39B-Readme.txt"2⤵PID:6472
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:7236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\ClickToRun\MachineData\Catalog\Packages\{9AC08E99-230B-47E8-9721-4577B7F124EA}\{1A8308C7-90D1-4200-B16E-646F163A08E8}\Manifest.xml
Filesize3.3MB
MD58cb673621df04e7311e836d6de32bd93
SHA17fb4800ddd3d47d5cf6ecfad3dec2f4249e86eb5
SHA256b2ca5caa32abea39c482c34f4c446e2e6b80d3818e7e173b742dbde6fea9a7d6
SHA512ce02f226a6887621c8f2a3a092f8f14d767207731bc4b433a08c514ef7718e6833a2e541aca4f3de78d39c4b7dda8d84a166b00055b243f416465c162368bc76
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\d1ecfce2-f845-c1e9-052b-d2f457c135e6.xml.5cf39b
Filesize3KB
MD584fdd5c84f363bd415dbd73a23b33ed0
SHA1614d04f5a18d05a0aa7ae397c0ff2323158330e1
SHA2564ec389826ab8e127d5d1e27001d56e0eafe733a7c2677ab943e6a93a413de880
SHA512e713ef337067a1bdb0d5ba9ffb24ced88b50fe0c7478d6e80628fb39034507dbb02119e6b6e0cb0fc69497516e6929bb0474179fcc2ff21edfe2f7ddc14e3295
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\e2a686b1-b02a-b3e7-90cb-3fa0d708ce04.xml.5cf39b
Filesize2KB
MD50e7c4937038fe0aa0428af3904108732
SHA1afa07bbc3596059c2b77cf5db9130ae6eda690e6
SHA256abaff6b73982a15b7ee456ade53c45bed01b6d52258a20c6bb964203f9b6db3a
SHA512d41a5e1440c26938b481fbd6d221cc4e5fa582ec4123d1c8467e584dd2ad3a61b66cc19dfa6819b5d224d62d365fd1c8f20849fef0c9482ad6a20c63d257f7d8
-
Filesize
1KB
MD5aef885ca9528d45a550f5ac5c4ca95d1
SHA103e0d37ce552acfa9e7451251b0277a114b8734c
SHA2563d8236c0f01449db0d6677353757e49d72956dcff0c78f180eb704e884ce2080
SHA512370d39892143db64d43effea2b6b1ce45bf652aefda0dc307418d4d07a60b3f63d31dbab68c7ea81d6f001ae7d618b2de0993e148c2da935064c15d484f404e5
-
Filesize
1KB
MD5ce1da830eb3ae439076e214634500a42
SHA19fe8cc8379a953cd2d893ecbe73cbfaef38b1d33
SHA256e24224a26dd7467348ab1916415f09f2848978583520edb995f128921e71ec54
SHA512f4da0955cbc445010e000716ea0cfe6739a84b639ba21e3b676ec2107a369952cad87b121ebe7746cbfe156b491683d2531b256f8e5f6afb1ecb2842519d5123
-
Filesize
1KB
MD58ea56a223693fbdd22324a36f115291e
SHA1da61c48df711ba5cbb14e86ea8dc45fb3151200f
SHA2569ee06b196f4ecc707179a5a2c14d1be7573f9bccf930a983cc648d9b19f8b5ff
SHA51230dd167c8d6ff67887ebc1a422c03a78d646acea383c961a918ee1ed4a013482da4d74e2a86c01165f977196486f4c706663261bfb877c80f419c90b7e0d7113
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD586ae40017c4656810d5cf7500019ff01
SHA1400dbb1e83d5bfe0b5455641c2f3212299b3f0d3
SHA256a2754d95b182be6babf2d35809e987936581164a6be2d96b43e7450d8bd10036
SHA512119247bbb0f2b5ff71568fb1a990dfbc501056a1c759cb8ae7a98fa40fdd2106e417aef7e768bf655533e8f26248d4476ae9385b43bc7cefe752a204e7bf9345
-
Filesize
6KB
MD5205804084f4560d6f0fadb86fdf35557
SHA19635e4f45d81dfc0532a3a9a2b912379e8a42498
SHA256534682b7a5fd707970fc72d24e1434e50fca1742ecdca30028abfa62efdc6ab2
SHA512134f10c14e5ea89aefa490affe80f7c2449417b0d03a048b9620ab735982b9ad6a2880dd59deb9d00eff5feb7b13a5ee68b4736b7e3df86f914838eff67a6704
-
Filesize
652B
MD5e29e69121619393706b7dd15b0ef5a4f
SHA17131f55286d1fe6a58fd098a197ac8b8d140ed0e
SHA256283a544d638d2eaa5e9cf6a3b0a7e7e185821a5c8f1ce250dd7ec44391f1481f
SHA512d8791060fda5c5fa6bb86f01a7e72b29a547dca256e3a966aedf489a8ae8602cd44a9d19e89eb70833ae9bbc8480640b141d0639bb95bcf2d554d06b75a86b59
-
Filesize
2KB
MD5c97bbb0991bdcc70f6cd23e863029f03
SHA13f21d01b0970a323b090056e285b4261c784cb19
SHA256c59ec8f208e5dd9e310b3ca6a2148c22ff52ada68d15e2cd0ade4a819a20208a
SHA512436100ea9f52ae49a6c5179d12464a1e18bb0cbfddb4545774d582fe2d5c269efdf6bce97ad84deb3419f29f4ba0572a1ccebd5beb70ecd98c7c59ed77f4196d
-
Filesize
369B
MD5d13c8341ee50f79f10135541c31be050
SHA1f7abdcd3a6c809c09a6f85c55122c4aafab33ec4
SHA256a2b03c67e87911e28eea2e4a99cd02fa5ee829c14dbbbd5f5655dff85b8823de
SHA51251ea6bad4844015504fa194263bf04aca81f7ab0199eaac1a1b1a0e096695433ec5e0d933de123326bd1018cdf11e13a3488f69c327e38ef34a8974f780674b6
-
Filesize
652B
MD5853e33e917383f53535b750abdc6ce23
SHA16cb58171c69ea4f86d814cee79c46020686331ea
SHA256ed94b5b092c7cde8dc3c109f1b8a69a88d157459596d6a6d106da71a8de29f64
SHA512231e3281503ef7aa350b6941348523b0ef9e985e426d0d36ccb5900f6407e63b63e24093b4feaa6acc9b7314fc7eaa79e6bbea53ac9661dde63fbf00c80aaaf5
-
Filesize
8KB
MD507086ea98fed0079427b7f0710fe62e0
SHA18bd780bdb9a03d88f32ebef8549509a697fe0102
SHA256eab011089366b76f3f371a62efbe22340ed3adbd2cd5a46a5558c3faac101fff
SHA512d1b4741ca1d09f5b8e72e43c6d08a8f6d69d14cac46bf3c42004e0105e18e892f2ea44f3b28a984779c3c047f5641431148c39bf0eb09093473d2c105c4d2d97
-
Filesize
369B
MD53ba1af544776cf1df9866960e2415816
SHA150e6dc9ca12cb12fb25d0e0664cd02b245c1bb04
SHA256c0c0849ca4161f74bce1fa79184308cba7e765e4fa67415dff7cdf513ec77083
SHA5129f6d8931c6d20759f0a2cf62697574e798dbad8018cda8d01b9150a712c2bff8d84f30840bb7a98df4b51450cb0e9846b743419d05ef6530035061a9f72536e8