Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 01:23
Behavioral task
behavioral1
Sample
5c760a424e177dbef0c9a7df01c7cd49_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5c760a424e177dbef0c9a7df01c7cd49_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
5c760a424e177dbef0c9a7df01c7cd49_JaffaCakes118.exe
-
Size
171KB
-
MD5
5c760a424e177dbef0c9a7df01c7cd49
-
SHA1
8d83adf33ff0f1a496a691ecf088529c7e706043
-
SHA256
3f8ecf8e97a0aaf72edc5b09dcde54171844e8addceb7c3ca12752470d92de18
-
SHA512
228f38c60272a3b809851c66c1d075f2b10e1d1da4d1c61fc91629e86883528c2f5763f48d6c9a3a36925dd8ef98cfa2624c0ebe5cd66853507050d8a97936f0
-
SSDEEP
3072:ZIZs1DWIIPV0SbLz+Dcjh9SYvioAQWz5GdIQFZ8HRVFqc4v:ZIqWIIPV0SbP+ojb7qoAfqI3RVFq1
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral2/files/0x000b0000000235e6-13.dat revengerat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 5c760a424e177dbef0c9a7df01c7cd49_JaffaCakes118.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe -
Executes dropped EXE 2 IoCs
pid Process 4672 Client.exe 5052 Client.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Client.exe" Client.exe -
pid Process 4388 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2312 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4388 powershell.exe 4388 powershell.exe 4388 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2568 5c760a424e177dbef0c9a7df01c7cd49_JaffaCakes118.exe Token: SeDebugPrivilege 4672 Client.exe Token: SeDebugPrivilege 4388 powershell.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2568 wrote to memory of 4672 2568 5c760a424e177dbef0c9a7df01c7cd49_JaffaCakes118.exe 105 PID 2568 wrote to memory of 4672 2568 5c760a424e177dbef0c9a7df01c7cd49_JaffaCakes118.exe 105 PID 4672 wrote to memory of 2312 4672 Client.exe 107 PID 4672 wrote to memory of 2312 4672 Client.exe 107 PID 4672 wrote to memory of 4388 4672 Client.exe 109 PID 4672 wrote to memory of 4388 4672 Client.exe 109 PID 4672 wrote to memory of 32 4672 Client.exe 111 PID 4672 wrote to memory of 32 4672 Client.exe 111 PID 32 wrote to memory of 2832 32 vbc.exe 113 PID 32 wrote to memory of 2832 32 vbc.exe 113 PID 4672 wrote to memory of 4776 4672 Client.exe 114 PID 4672 wrote to memory of 4776 4672 Client.exe 114 PID 4776 wrote to memory of 3240 4776 vbc.exe 116 PID 4776 wrote to memory of 3240 4776 vbc.exe 116 PID 4672 wrote to memory of 4524 4672 Client.exe 117 PID 4672 wrote to memory of 4524 4672 Client.exe 117 PID 4524 wrote to memory of 3472 4524 vbc.exe 119 PID 4524 wrote to memory of 3472 4524 vbc.exe 119 PID 4672 wrote to memory of 1840 4672 Client.exe 120 PID 4672 wrote to memory of 1840 4672 Client.exe 120 PID 1840 wrote to memory of 2684 1840 vbc.exe 122 PID 1840 wrote to memory of 2684 1840 vbc.exe 122 PID 4672 wrote to memory of 5024 4672 Client.exe 123 PID 4672 wrote to memory of 5024 4672 Client.exe 123 PID 5024 wrote to memory of 460 5024 vbc.exe 125 PID 5024 wrote to memory of 460 5024 vbc.exe 125 PID 4672 wrote to memory of 4360 4672 Client.exe 126 PID 4672 wrote to memory of 4360 4672 Client.exe 126 PID 4360 wrote to memory of 3600 4360 vbc.exe 128 PID 4360 wrote to memory of 3600 4360 vbc.exe 128 PID 4672 wrote to memory of 1144 4672 Client.exe 129 PID 4672 wrote to memory of 1144 4672 Client.exe 129 PID 1144 wrote to memory of 2976 1144 vbc.exe 131 PID 1144 wrote to memory of 2976 1144 vbc.exe 131 PID 4672 wrote to memory of 3248 4672 Client.exe 132 PID 4672 wrote to memory of 3248 4672 Client.exe 132 PID 3248 wrote to memory of 3568 3248 vbc.exe 134 PID 3248 wrote to memory of 3568 3248 vbc.exe 134 PID 4672 wrote to memory of 2568 4672 Client.exe 135 PID 4672 wrote to memory of 2568 4672 Client.exe 135 PID 2568 wrote to memory of 992 2568 vbc.exe 137 PID 2568 wrote to memory of 992 2568 vbc.exe 137 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c760a424e177dbef0c9a7df01c7cd49_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c760a424e177dbef0c9a7df01c7cd49_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Client.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Client" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Client.exe"3⤵
- Creates scheduled task(s)
PID:2312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Hello World!','Hello!',0,64)3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\-et1tswa.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES12E2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc762AA2FAE51B4B29826D4759A157405A.TMP"4⤵PID:2832
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lihlvvqh.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES136F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3776D52DB7BE4D97A135CBE16C6E98C.TMP"4⤵PID:3240
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\js8ohsvm.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES13EC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc453900E8E74B46BFB93958E01016CF92.TMP"4⤵PID:3472
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\p1pqrnuy.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES14D6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc5BEF85316DEB4936A5FCA3C2E7D46A5.TMP"4⤵PID:2684
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ebmo0tre.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES15D0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1997C63CC5C24733B716FC72512357C6.TMP"4⤵PID:460
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ae8etqmd.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES169B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6381D653AA0B489EA073605C8923FA84.TMP"4⤵PID:3600
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\p2pmng2o.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1728.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3CE111FAEBA40C991701E4EA9187B5F.TMP"4⤵PID:2976
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ifduqoqg.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1786.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDE8F36556464AF59F808EDB91F6E8C.TMP"4⤵PID:3568
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\t5d8njfj.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES17E3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7F4E7EC0A42D48B0A91B3E3A62D36C1.TMP"4⤵PID:992
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4116,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=3440 /prefetch:81⤵PID:5000
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Client.exe"1⤵
- Executes dropped EXE
PID:5052
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scripting
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262B
MD58cf7b621ac99e27fb3c1f7bbed3261b6
SHA1b3804e6705058de6a333205e477c675d9195550c
SHA256a2909d3da7b6c0e826cac2ff9039969cff03f55af9b8c8d89ad5bfe5ab92a162
SHA51260abc537d57ee7d06bb779af3e6000f66cac9e32d20fbe18776f07c17071204aa03e6de5889d6ccb056310fbe56c97fde74fd7cbb927cb9d3632e9d4b1a6d1e2
-
Filesize
156B
MD577b64b174dc91bccd07087d12a926ce6
SHA1e0b7180c5cb8cb59546247ed366ddf027adca77b
SHA25617b0a206c86c909b9061538c5e988b4ee5299f148f48267bb41a7580100c166c
SHA5123253959b4733ebfa2ec0bf521eb33b13598f19590cdfe73b09cc3c1334ff255cf5ead2c9b9b37e9bd8fd602a9297823d59ae4d5e6ddc220d0ab6f0f249718ba2
-
Filesize
1KB
MD599a25c65bf8d8a298b9868b443914d08
SHA1d4ba3cb4e47641069f18113cfc1028562308e641
SHA2563c168454a27286c7d560544adcca24493138a5b0aa1d6281168573920f377e34
SHA512564a65591fc9f77f7c39774f287e646dae9c5544b9098468aa6f14aac5aa78e12a70050fb05e8b59cacfa4e21980f5534f35f25ea468e8f54efb8d80c444c7ad
-
Filesize
1KB
MD5d5ab0ee64e73967750c523974a7c6805
SHA1d488976c0e56e6f89178cc9c6a20f4dc9c569193
SHA256b50be291721e355c9a45c398ea13ce349918587ad7e41b889b1acec87c5842dd
SHA512aef9c6c6245ca0ec0ae3065184bb24ff9d98485182dee2d5faf69ad1060bfe0bbf736d836a948f0617b876a7aa2da3a27d616b2259d176366649effd78c80c50
-
Filesize
1KB
MD59c778be9d93ba48054b0b605d4a3e067
SHA1bfc5f6fd89e2cc94c21a195f2c8ed47ac6407561
SHA256afebd54e3b5e8180510d82d7779b4c084fd4a7edf928b25be0e66072e801bae6
SHA5128ea0444c5d7ab0d2dab1e6ee6c04d4394a20d77afd8a9d98ce28a88eb37c2e66ce2ff6f8812165fcf54af762487e883ec06ee5d0a7e79cf2232542178434dbb4
-
Filesize
1KB
MD59455a6d1c42a9bbece65fc3050f67e03
SHA180c778c3495cd46a7bf199955d1416efbc19cbd5
SHA25634144a6c229a61265772441f8ecdfb78b6b0826a5d45197e241f4c9cc017a8ed
SHA512a7c326995a7ac5fafd580f2146d831153364050052f24127dbc07b75976498e57a8a5551bd2e45cf7784d4b3bd8ac1d52292068d9919bf314c723ec62176f067
-
Filesize
1KB
MD56b02dcccc2a539f65be66bca41056cce
SHA1dce1334801c2b1456c54f80131c5372f7286ea11
SHA2561c2ba679aa96cf3021474058f706359ba95cd12c2369f3dc1de108a7c3096273
SHA51250c0e685198a04069931428ca4441b0329492e067a649c65b5abeebf10001fc1cd282c33cacc5f3df9d21aaadc752b2a289fbbc2eec518926b4251db7487f80a
-
Filesize
1KB
MD5cf937be7f42d16fffee58d637969895d
SHA1b1c7e264111bb5deeb38e71e3f8abd8da27a9857
SHA25680dff06579d025d52f8915fb8f3adfb0282ad4b5857ffc708c98ea182fc71c45
SHA512b218f330cd1be1399fc7dfb26393de5d7fd68e4afc2cca2d66d7a2c43a5d01250a7ea4aa9f360995bb4af433f5ce2e38c586f7676f6a673c057cf97435f246d3
-
Filesize
1KB
MD5c7877cf1cf314b6fb1ddbff81cf6a8cf
SHA1bf1b802a6a92e35e7f82a232d90bb4733883c3cd
SHA256b7d36e5407c22935a44004313fc3b7ee3410b95d24135cc6b106b9029ad94237
SHA5127bfc162c49f9b774071aee5e6f9524f5aae8973899ef0a010bd4568820e7170e4651ba6cfb4b15643e0172b624d3023eb157df3c4a19e502079a58ba1d7e39af
-
Filesize
1KB
MD5fbafc6c35eb62242fc309e5dafe0d5a8
SHA154bd77b6af69acd3154ee8dfe615aad1ddee2411
SHA2569d53cd3a912dfeca0a82c3c1e2ca6fe3299d4fcfeac639004e94e03014e437e7
SHA512097e1502122fccc4131a2b1d49c2a473d4c7e0a7ed1a610a556f8b71a470155b21da01a34e8b8eafe96b22c8d717df4769ff6e491175cb221e13d0cb22317b12
-
Filesize
1KB
MD5d4506b65260ba9f476a6d50789488d93
SHA1b1c850757ddaa69ad7422e923cc7cdba91eb5bbe
SHA2567dcf9e59b28f1e6e02864fae4b45d64e7bb4bf7a272f79e37f1e22107fe9affa
SHA512a5736c206f99e5dd5574433e34ff8604e2ccc7e1fa20034851c778c0190c99c5123313d247e07e7089d1602606107c60ab5187bbab7eae6f090101b22ad34e91
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
270B
MD5cb0f65d0a016eb9352822a874a57627e
SHA17d59651244eb906eabcc2c84d80d2fcc6a743130
SHA256dbf6ed6a93022acb240150687df9d3336215728a51258df92b2e60e5109bc70a
SHA5124bdff418a9cd630f745f511b4d88ef9c2ea3ad7014aa7ad5c2f8592d668be595e1043b314114a232b4bd3d08cf1751a5f64a16e24c274f3963b5ae5f2e2fc1ff
-
Filesize
164B
MD56d433fad82fa70b55890c6b54f8af83d
SHA109be878b05d6407cf62080a06afaac94d7f8021e
SHA256f7d726eb03cbef4380067ad39bc32928caf34e7e965fc892d41c2df83f9ccad1
SHA51223d1de79a42b1a5f6243b90dadbbcef1ddd183c5e94c0c3976a3cc4434e24d4649123373b3b7d262511529e16f3f274e3e363ed88068aec6f44799e054799e48
-
Filesize
280B
MD54d8f1afb3ed9f5a3eeb3b8fb8fce0f45
SHA1e4c97e3c43095007cba55e0a733a4c0e50a398ba
SHA256a879a45aede6c08a2f756a5f4591e62aa16ca12ae1f8b249978f0246c7c694e5
SHA5126b8954659d72d0da98cac2a738ca8de2751400d6d6c2eef68cc04fa383968a7b0c1a078f8ec3fb9c09d2844a2280212f232dd74c517237ccfe628f46350742b8
-
Filesize
174B
MD5427c54399f1c79fc61cfab3929d6787a
SHA192a3a3e404acd2ab4a25e011def15bc9035c035a
SHA256d7a7c36aee7e07c476d1eafa6c946606ada18c0ea0236a393c77888c50b5e8a7
SHA512d76d47a99c40707c14c82160c484f647283dff93f688b89f02932a50d3da878160fd7ebf177f12d59fdd290e48931bbdb3c6f550859bb7026842a672d7441e5c
-
Filesize
277B
MD56667d496e8a18aeacf3c6e2d08a0f1e2
SHA1366007276a835b57bb2328ca00181509f98a6d68
SHA256d90d11ee50d4ba0d4c4eccde3085e7871a3b553adf2f855d476ccce957290308
SHA5128bc9cf9f5819cc874b982daa4c7c5e27c28a2959707cc8b1465e55cdf19063a3f664889d4d1ba626cdbc5f9353b3558dcc1a350e941c655199e62d5b8a9580d2
-
Filesize
171B
MD5795f82a27f7c5091c665ddd13fca30a1
SHA1b0f94efe749ab654604be063c47be984c210ba92
SHA2568f15771e4f62d19ef354ad5a755a43b1f6cd36066443a3caf04e435514a548a2
SHA5120027cfe7334162f3cd1a47aa4d0a0545f89011cb9c7bf67ed18c1e4b48dd562ecaa16ed6a44345029601a165332977ff12aae479ac5ff9cea084040028debf42
-
Filesize
277B
MD57dd49fda8abeb2475c6539f017e8b03d
SHA16789eee7ee3f85a2ec697aa6baca93c2d07e851f
SHA2561d8825944d3f2468c465c055af5e8f334b2a90a9b686ee07dc7118b638d7dc40
SHA512ca05cf2d34b2daa636c8d3a1ba6bd3d8f459b79a2de9b4ccc847cb93a7d1bf03ec5e2d84b3715fe5c91b1865abb1a5d0404c24574083675739d306873bfc824d
-
Filesize
171B
MD553e69ed3420a3fbf860fcba3639763d4
SHA136542664f22eaefff3c8ad980227b15d12f132bd
SHA256aa022a317a647c1646372a936f565401af4fb7cb71968a5fc1a80f1beb66194b
SHA512333dcbde6875ef9a23497260f81b03dad8b7c8a5f7b95fe1a6cd527d11baa0d2d0686addbf90554abb431e0877b8d83d615092109d6eb60f11fbe76e4eef87b8
-
Filesize
268B
MD5222a06289d5bfa9d6f23d5a7cbe9f0c5
SHA1ed3dd51aa9c8e284136b2ee9c3bda248380e0b6c
SHA25652a04ffd331600f1d08eb476ec608d41bef2cca24ac38684e1f54d2882ebb443
SHA512d344f34e45997af876d30c1d87708b1cf43bc15a2a3d0a31706c4b97fb6bf4312bd780e1bbe13ee09f377322b153f6e3be6ff6986d888251410c20e79e47d766
-
Filesize
162B
MD5bcda818ddec483e7f959e9efdffee3f8
SHA1f793a652fd05dfaf6f9295aa218dfbe24c75ceff
SHA256de7413a7c1c5241c574c51400832266e127ea8637a62e420c0e96f24aa727581
SHA5129b55219313ffa347e616df009657bf8456556782574a84a771063d80d5c0936847cbd59c245f555739d5ec61a9bc81e68b9e500ee97e63c829df8a0dd2e2bf0d
-
Filesize
278B
MD55bc92729c7989db3ecc76e5e4c44b10d
SHA1dda2cb12d82d7a7ae6d6c2f5c9ab5cd82c87a2e9
SHA25676ec533ab24480e64cc90c9caebee926d0a523f283377031bc025bf14bb96dca
SHA5120e8d42cd8fec4b00487fafa23a132a7853fa022a33fe26730e00f994cdfd42f2d6df4214ac145ad555b7ea1edabf3344cc9da69f923d7330768ffa22fbb5da26
-
Filesize
172B
MD536e47e114c3c32c0ba442fd7286fa263
SHA14a45f7c413f6d151fcfe1d0a7ee8bccb38247075
SHA256e588856b6961dd1b9589f56adac86776cce74a3120b11363a6b705999c7d54d1
SHA51228ab0bcd93540b495d2aead1f4820e2e02f8139d14d2a547fcd6e86507565c34175d91975d4fe7625c5e6a599c355e729b175bb53838d0eaea25486db85dca72
-
Filesize
276B
MD59728d7479fa4932a6ddfb2bbb3fbd476
SHA102485c002a581e859f31c672ccd21da5c956667e
SHA25646111c43b6c3cc66a40934059edaad59fc921ec83e4a8f2666ab6c2ee1ea832e
SHA51215c3c7d916d15599d3151c031e8fa2fb004e3c53b411e81eacf6fb1e5a74ef073f91e0e46bfaa6e34816e9218b1aa24cd2907d3820cb71542a3ddfb5ac119826
-
Filesize
170B
MD565c9924f19105ff816481f22cf7cfde9
SHA1a2cdddf5c4141166a2ff9739257e0c238a1ed73e
SHA2560d0031e51a32705942fcc13fa3d140b11d3eced98b8d071edaa263a9df26beeb
SHA512691fc8bcde16066789026d89c7c589f36d2524e896b771fe822a5b27f37c14755589d8e4fa45b651347303e5b1a3eed21e55b40c7b5fe987e7171f298b117f2a
-
Filesize
279B
MD533306ccba8def6f472ac5859b2fdee3a
SHA1fbba4ad2f45abcd3bb769224e54ca5ef19d7fae1
SHA256943614468a973d81e9e6553ebd2613d9a5ccb4140b53923e256f048b4d098b66
SHA5122fd8c671d1e0a3466e80b25a4742230fa5c176cf27d60728a6f5265fdc1f6ed3944c6bc1255fb1174d82fe5655e6bf34005535a6b62ddfc938efbea851587d33
-
Filesize
173B
MD57e7472d356766ddffe96989e287f1acd
SHA1e8593fc15dcabbb4b42c5f52540c721b43c4e1bc
SHA256550edec5855d2d4f41b00406b49feb0984127fb2dd935f0b35f9f9a1d066053d
SHA512b5d5bb078d7867c8ed4780280519d1bace17f8204c491907ea2d4d03248d5b7bf05ed9e5da1b743a263e68c1eb1a15bd5392ef9bf50d94e907e8e4190576618d
-
Filesize
684B
MD58135713eeb0cf1521c80ad8f3e7aad22
SHA11628969dc6256816b2ab9b1c0163fcff0971c154
SHA256e14dd88df69dc98be5bedcbc8c43d1e7260b4492899fec24d964000a3b096c7a
SHA512a0b7210095767b437a668a6b0bcedf42268e80b9184b9910ed67d665fba9f714d06c06bff7b3da63846791d606807d13311946505776a1b891b39058cfb41bd4
-
Filesize
668B
MD53906bddee0286f09007add3cffcaa5d5
SHA10e7ec4da19db060ab3c90b19070d39699561aae2
SHA2560deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00
SHA5120a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0
-
Filesize
676B
MD585c61c03055878407f9433e0cc278eb7
SHA115a60f1519aefb81cb63c5993400dd7d31b1202f
SHA256f0c9936a6fa84969548f9ffb4185b7380ceef7e8b17a3e7520e4acd1e369234b
SHA5127099b06ac453208b8d7692882a76baceec3749d5e19abc1287783691a10c739210f6bdc3ee60592de8402ca0b9a864eb6613f77914b76aec1fc35157d0741756
-
Filesize
644B
MD5dac60af34e6b37e2ce48ac2551aee4e7
SHA1968c21d77c1f80b3e962d928c35893dbc8f12c09
SHA2562edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6
SHA5121f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084
-
Filesize
684B
MD57a707b422baa7ca0bc8883cbe68961e7
SHA1addf3158670a318c3e8e6fdd6d560244b9e8860e
SHA256453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c
SHA51281147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9
-
Filesize
171KB
MD55c760a424e177dbef0c9a7df01c7cd49
SHA18d83adf33ff0f1a496a691ecf088529c7e706043
SHA2563f8ecf8e97a0aaf72edc5b09dcde54171844e8addceb7c3ca12752470d92de18
SHA512228f38c60272a3b809851c66c1d075f2b10e1d1da4d1c61fc91629e86883528c2f5763f48d6c9a3a36925dd8ef98cfa2624c0ebe5cd66853507050d8a97936f0