Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 12:13
Static task
static1
Behavioral task
behavioral1
Sample
34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe
-
Size
796KB
-
MD5
34abca8450c0c9eac650bdf18bee6dd4
-
SHA1
95dfc1abad758ccc8f5819dabc57d7500dea144e
-
SHA256
b9e2ce6b1a1673f8d139e08aca7a989f3d92f2f820814338ed13136c0cf70141
-
SHA512
d601218799e20fd59ac289686693a7c0d1205d0b35d4c07aab57dcf59efc5579c9f75db41d8bbf89b121304bf7ea3e0c754cbb7d89859b9e0c54bf16d7e76a2b
-
SSDEEP
24576:N5TZm3gZfVdpMyJ5WK+ENan+odha5GyAaK0aL68U3VRjVmPLyqduOhtkQFViUVBr:3Z3fGyJ5PRQn+Upqae8U3VRjVmPLyqdZ
Malware Config
Signatures
-
Modifies security service 2 TTPs 20 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe -
Executes dropped EXE 9 IoCs
pid Process 2608 sysmgr.exe 1916 sysmgr.exe 1684 sysmgr.exe 1324 sysmgr.exe 652 sysmgr.exe 1072 sysmgr.exe 2124 sysmgr.exe 1552 sysmgr.exe 2500 sysmgr.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Wine sysmgr.exe Key opened \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Wine sysmgr.exe Key opened \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Wine sysmgr.exe Key opened \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Wine sysmgr.exe Key opened \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Wine 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Wine sysmgr.exe Key opened \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Wine sysmgr.exe Key opened \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Wine sysmgr.exe Key opened \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Wine sysmgr.exe Key opened \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Wine sysmgr.exe -
Loads dropped DLL 18 IoCs
pid Process 1672 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe 1672 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe 2608 sysmgr.exe 2608 sysmgr.exe 1916 sysmgr.exe 1916 sysmgr.exe 1684 sysmgr.exe 1684 sysmgr.exe 1324 sysmgr.exe 1324 sysmgr.exe 652 sysmgr.exe 652 sysmgr.exe 1072 sysmgr.exe 1072 sysmgr.exe 2124 sysmgr.exe 2124 sysmgr.exe 1552 sysmgr.exe 1552 sysmgr.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File created C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File created C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File opened for modification C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File created C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File opened for modification C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File opened for modification C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File created C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File opened for modification C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File created C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File created C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File created C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File created C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File opened for modification C:\Windows\SysWOW64\sysmgr.exe 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File created C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File opened for modification C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File opened for modification C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File opened for modification C:\Windows\SysWOW64\sysmgr.exe sysmgr.exe File created C:\Windows\SysWOW64\sysmgr.exe 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 1672 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe 2608 sysmgr.exe 1916 sysmgr.exe 1684 sysmgr.exe 1324 sysmgr.exe 652 sysmgr.exe 1072 sysmgr.exe 2124 sysmgr.exe 1552 sysmgr.exe 2500 sysmgr.exe -
Runs .reg file with regedit 10 IoCs
pid Process 2520 regedit.exe 984 regedit.exe 2840 regedit.exe 1032 regedit.exe 752 regedit.exe 2232 regedit.exe 1040 regedit.exe 904 regedit.exe 1632 regedit.exe 2552 regedit.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1672 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe 2608 sysmgr.exe 1916 sysmgr.exe 1684 sysmgr.exe 1324 sysmgr.exe 652 sysmgr.exe 1072 sysmgr.exe 2124 sysmgr.exe 1552 sysmgr.exe 2500 sysmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2868 1672 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2868 1672 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2868 1672 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2868 1672 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe 30 PID 2868 wrote to memory of 2840 2868 cmd.exe 31 PID 2868 wrote to memory of 2840 2868 cmd.exe 31 PID 2868 wrote to memory of 2840 2868 cmd.exe 31 PID 2868 wrote to memory of 2840 2868 cmd.exe 31 PID 1672 wrote to memory of 2608 1672 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe 32 PID 1672 wrote to memory of 2608 1672 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe 32 PID 1672 wrote to memory of 2608 1672 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe 32 PID 1672 wrote to memory of 2608 1672 34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe 32 PID 2608 wrote to memory of 2164 2608 sysmgr.exe 33 PID 2608 wrote to memory of 2164 2608 sysmgr.exe 33 PID 2608 wrote to memory of 2164 2608 sysmgr.exe 33 PID 2608 wrote to memory of 2164 2608 sysmgr.exe 33 PID 2164 wrote to memory of 1632 2164 cmd.exe 34 PID 2164 wrote to memory of 1632 2164 cmd.exe 34 PID 2164 wrote to memory of 1632 2164 cmd.exe 34 PID 2164 wrote to memory of 1632 2164 cmd.exe 34 PID 2608 wrote to memory of 1916 2608 sysmgr.exe 35 PID 2608 wrote to memory of 1916 2608 sysmgr.exe 35 PID 2608 wrote to memory of 1916 2608 sysmgr.exe 35 PID 2608 wrote to memory of 1916 2608 sysmgr.exe 35 PID 1916 wrote to memory of 2628 1916 sysmgr.exe 36 PID 1916 wrote to memory of 2628 1916 sysmgr.exe 36 PID 1916 wrote to memory of 2628 1916 sysmgr.exe 36 PID 1916 wrote to memory of 2628 1916 sysmgr.exe 36 PID 2628 wrote to memory of 1032 2628 cmd.exe 37 PID 2628 wrote to memory of 1032 2628 cmd.exe 37 PID 2628 wrote to memory of 1032 2628 cmd.exe 37 PID 2628 wrote to memory of 1032 2628 cmd.exe 37 PID 1916 wrote to memory of 1684 1916 sysmgr.exe 38 PID 1916 wrote to memory of 1684 1916 sysmgr.exe 38 PID 1916 wrote to memory of 1684 1916 sysmgr.exe 38 PID 1916 wrote to memory of 1684 1916 sysmgr.exe 38 PID 1684 wrote to memory of 2024 1684 sysmgr.exe 39 PID 1684 wrote to memory of 2024 1684 sysmgr.exe 39 PID 1684 wrote to memory of 2024 1684 sysmgr.exe 39 PID 1684 wrote to memory of 2024 1684 sysmgr.exe 39 PID 2024 wrote to memory of 752 2024 cmd.exe 40 PID 2024 wrote to memory of 752 2024 cmd.exe 40 PID 2024 wrote to memory of 752 2024 cmd.exe 40 PID 2024 wrote to memory of 752 2024 cmd.exe 40 PID 1684 wrote to memory of 1324 1684 sysmgr.exe 41 PID 1684 wrote to memory of 1324 1684 sysmgr.exe 41 PID 1684 wrote to memory of 1324 1684 sysmgr.exe 41 PID 1684 wrote to memory of 1324 1684 sysmgr.exe 41 PID 1324 wrote to memory of 2724 1324 sysmgr.exe 42 PID 1324 wrote to memory of 2724 1324 sysmgr.exe 42 PID 1324 wrote to memory of 2724 1324 sysmgr.exe 42 PID 1324 wrote to memory of 2724 1324 sysmgr.exe 42 PID 2724 wrote to memory of 2232 2724 cmd.exe 43 PID 2724 wrote to memory of 2232 2724 cmd.exe 43 PID 2724 wrote to memory of 2232 2724 cmd.exe 43 PID 2724 wrote to memory of 2232 2724 cmd.exe 43 PID 1324 wrote to memory of 652 1324 sysmgr.exe 44 PID 1324 wrote to memory of 652 1324 sysmgr.exe 44 PID 1324 wrote to memory of 652 1324 sysmgr.exe 44 PID 1324 wrote to memory of 652 1324 sysmgr.exe 44 PID 652 wrote to memory of 2304 652 sysmgr.exe 45 PID 652 wrote to memory of 2304 652 sysmgr.exe 45 PID 652 wrote to memory of 2304 652 sysmgr.exe 45 PID 652 wrote to memory of 2304 652 sysmgr.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵
- Modifies security service
- Runs .reg file with regedit
PID:2840
-
-
-
C:\Windows\SysWOW64\sysmgr.exeC:\Windows\system32\sysmgr.exe 740 "C:\Users\Admin\AppData\Local\Temp\34abca8450c0c9eac650bdf18bee6dd4_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg4⤵
- Modifies security service
- Runs .reg file with regedit
PID:1632
-
-
-
C:\Windows\SysWOW64\sysmgr.exeC:\Windows\system32\sysmgr.exe 744 "C:\Windows\SysWOW64\sysmgr.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat4⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg5⤵
- Modifies security service
- Runs .reg file with regedit
PID:1032
-
-
-
C:\Windows\SysWOW64\sysmgr.exeC:\Windows\system32\sysmgr.exe 748 "C:\Windows\SysWOW64\sysmgr.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat5⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- Runs .reg file with regedit
PID:752
-
-
-
C:\Windows\SysWOW64\sysmgr.exeC:\Windows\system32\sysmgr.exe 752 "C:\Windows\SysWOW64\sysmgr.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat6⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- Runs .reg file with regedit
PID:2232
-
-
-
C:\Windows\SysWOW64\sysmgr.exeC:\Windows\system32\sysmgr.exe 756 "C:\Windows\SysWOW64\sysmgr.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat7⤵PID:2304
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- Runs .reg file with regedit
PID:1040
-
-
-
C:\Windows\SysWOW64\sysmgr.exeC:\Windows\system32\sysmgr.exe 760 "C:\Windows\SysWOW64\sysmgr.exe"7⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1072 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat8⤵PID:2216
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- Runs .reg file with regedit
PID:904
-
-
-
C:\Windows\SysWOW64\sysmgr.exeC:\Windows\system32\sysmgr.exe 764 "C:\Windows\SysWOW64\sysmgr.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat9⤵PID:1596
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- Runs .reg file with regedit
PID:2552
-
-
-
C:\Windows\SysWOW64\sysmgr.exeC:\Windows\system32\sysmgr.exe 768 "C:\Windows\SysWOW64\sysmgr.exe"9⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat10⤵PID:880
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- Runs .reg file with regedit
PID:2520
-
-
-
C:\Windows\SysWOW64\sysmgr.exeC:\Windows\system32\sysmgr.exe 776 "C:\Windows\SysWOW64\sysmgr.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat11⤵PID:2016
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- Runs .reg file with regedit
PID:984
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
2KB
MD5f82bc8865c1f6bf7125563479421f95c
SHA165c25d7af3ab1f29ef2ef1fdc67378ac9c82098d
SHA256f9799dc2afb8128d1925b69fdef1d641f312ed41254dd5f4ac543cf50648a2f6
SHA51200a9b7798a630779dc30296c3d0fed2589e7e86d6941f4502ea301c5bce2e80a5d8a4916e36183c7064f968b539ae6dac49094b1de3643a1a2fedc83cf558825
-
Filesize
701B
MD5e427a32326a6a806e7b7b4fdbbe0ed4c
SHA1b10626953332aeb7c524f2a29f47ca8b0bee38b1
SHA256b5cfd1100679c495202229aede417b8a385405cb9d467d2d89b936fc99245839
SHA5126bd679341bec6b224962f3d0d229cff2d400e568e10b7764eb4e0903c66819a8fa99927249ab9b4c447b2d09ea0d98eb9823fb2c5f7462112036049795a5d8bd
-
Filesize
298B
MD54117e5a9c995bab9cd3bce3fc2b99a46
SHA180144ccbad81c2efb1df64e13d3d5f59ca4486da
SHA25637b58c2d66ab2f896316ee0cdba30dcc9aac15a51995b8ba6c143c8ba34bf292
SHA512bdb721bd3dea641a9b1f26b46311c05199de01c6b0d7ea2b973aa71a4f796b292a6964ddef32ba9dfc4a545768943d105f110c5d60716e0ff6f82914affb507c
-
Filesize
576B
MD58a0897226da780b90c11da0756b361f1
SHA167f813e8733ad75a2147c59cca102a60274daeab
SHA256115ff7b8bbe33e1325a2b03fb279281b79b2b9c4c0d6147c049c99da39867bee
SHA51255e0e0791fb8e76fb67511ef2bfe1bdb934c857a5a555f9c72dd063250c18b17c57ff9f220c0d3cdd219828d87f5c08bfe5e198476c9d38119c4cfb099b99642
-
Filesize
2KB
MD554ca6e3ef1c12b994043e85a8c9895f0
SHA15eaccfb482cbe24cf5c3203ffdc926184097427e
SHA2560db388471ad17c9c9b4a0a40b2536b7a6f27b8cc96775812d48d7009acb418c0
SHA512925615f057558a00fb0ed3f9faeee2b70f3dd5469376de9381a387b3666c230fc0bb5b83fd3acf0169872e3c5f747cbdaff473d7fa389a5848f3828916680626
-
Filesize
1KB
MD55002319f56002f8d7ceacecf8672ce25
SHA13b26b6801be4768cc7582e29bc93facdf2a74be3
SHA256f23f4854d17525744e8028db6dde6eb7d5d664b0ee1b08870c9c01b639e0124c
SHA5128eae0fabc7f5a7e452abacf988a3632874c556af409da5e60c5e529524732b40f22d4e1d860ccceae87642875c819fc8a8120eceaabd25861f920c8c066a9aef
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904
-
Filesize
796KB
MD534abca8450c0c9eac650bdf18bee6dd4
SHA195dfc1abad758ccc8f5819dabc57d7500dea144e
SHA256b9e2ce6b1a1673f8d139e08aca7a989f3d92f2f820814338ed13136c0cf70141
SHA512d601218799e20fd59ac289686693a7c0d1205d0b35d4c07aab57dcf59efc5579c9f75db41d8bbf89b121304bf7ea3e0c754cbb7d89859b9e0c54bf16d7e76a2b