Analysis
-
max time kernel
141s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
3cc03361667e66d0c7144932ad4e1cd3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3cc03361667e66d0c7144932ad4e1cd3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3cc03361667e66d0c7144932ad4e1cd3_JaffaCakes118.exe
-
Size
68KB
-
MD5
3cc03361667e66d0c7144932ad4e1cd3
-
SHA1
f822e2319cc643acf71bc9ceaaff386b7ac0afce
-
SHA256
ac2a661cb7e75f8fb1863489037d16d5609c227a11ea4b13cea8a2231dc8d81b
-
SHA512
964d441e777c1a04333ff468d5104bfdf43cee6f5ec4ab2bc3006d5a575603cabef9d8f93d49aab39b603f18cee63e8a48801a55bc7e7d19b386a1dbe015819d
-
SSDEEP
1536:ZkZ2SKsCoijF4ivDVPqBqQPV01Ogf9iWXpc/uRfKjdRv/cx9WXVs:mRxk5vA+OgZXQSSjd5/+9Gs
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00070000000234b9-18.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 2588 installer.exe 3832 mt-uninstaller.exe -
Loads dropped DLL 2 IoCs
pid Process 3832 mt-uninstaller.exe 3832 mt-uninstaller.exe -
resource yara_rule behavioral2/files/0x00070000000234b9-18.dat upx behavioral2/memory/3832-21-0x0000000010000000-0x0000000010012000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SunJava5.0 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3cc03361667e66d0c7144932ad4e1cd3_JaffaCakes118.exe" 3cc03361667e66d0c7144932ad4e1cd3_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3832 mt-uninstaller.exe 3832 mt-uninstaller.exe 3832 mt-uninstaller.exe 3832 mt-uninstaller.exe 1088 msedge.exe 1088 msedge.exe 2512 msedge.exe 2512 msedge.exe 3516 identity_helper.exe 3516 identity_helper.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4484 wrote to memory of 2588 4484 3cc03361667e66d0c7144932ad4e1cd3_JaffaCakes118.exe 85 PID 4484 wrote to memory of 2588 4484 3cc03361667e66d0c7144932ad4e1cd3_JaffaCakes118.exe 85 PID 4484 wrote to memory of 2588 4484 3cc03361667e66d0c7144932ad4e1cd3_JaffaCakes118.exe 85 PID 2588 wrote to memory of 3832 2588 installer.exe 86 PID 2588 wrote to memory of 3832 2588 installer.exe 86 PID 2588 wrote to memory of 3832 2588 installer.exe 86 PID 4484 wrote to memory of 2892 4484 3cc03361667e66d0c7144932ad4e1cd3_JaffaCakes118.exe 89 PID 4484 wrote to memory of 2892 4484 3cc03361667e66d0c7144932ad4e1cd3_JaffaCakes118.exe 89 PID 4484 wrote to memory of 2892 4484 3cc03361667e66d0c7144932ad4e1cd3_JaffaCakes118.exe 89 PID 2892 wrote to memory of 3404 2892 cmd.exe 90 PID 2892 wrote to memory of 3404 2892 cmd.exe 90 PID 2892 wrote to memory of 3404 2892 cmd.exe 90 PID 1292 wrote to memory of 2512 1292 explorer.exe 92 PID 1292 wrote to memory of 2512 1292 explorer.exe 92 PID 2512 wrote to memory of 4496 2512 msedge.exe 94 PID 2512 wrote to memory of 4496 2512 msedge.exe 94 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 4880 2512 msedge.exe 95 PID 2512 wrote to memory of 1088 2512 msedge.exe 96 PID 2512 wrote to memory of 1088 2512 msedge.exe 96 PID 2512 wrote to memory of 4464 2512 msedge.exe 97 PID 2512 wrote to memory of 4464 2512 msedge.exe 97 PID 2512 wrote to memory of 4464 2512 msedge.exe 97 PID 2512 wrote to memory of 4464 2512 msedge.exe 97 PID 2512 wrote to memory of 4464 2512 msedge.exe 97 PID 2512 wrote to memory of 4464 2512 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cc03361667e66d0c7144932ad4e1cd3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3cc03361667e66d0c7144932ad4e1cd3_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\installer.exeC:\Users\Admin\AppData\Local\Temp\installer.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\mt-uninstaller.exemt-uninstaller.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c explorer http://www.pinkiespalace.net/postinfo.html2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\explorer.exeexplorer http://www.pinkiespalace.net/postinfo.html3⤵PID:3404
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.pinkiespalace.net/postinfo.html2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbc23346f8,0x7ffbc2334708,0x7ffbc23347183⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:23⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:83⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:13⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:13⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:13⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3584 /prefetch:13⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:83⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:13⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:13⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3696 /prefetch:13⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:13⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1952 /prefetch:13⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2684 /prefetch:13⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6292096821632573194,1430893101516470579,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
Filesize
6KB
MD5dbf6b609d311de63ea274e527fae46d2
SHA1a9058bf4ba8206eea104781a67a44edf8a432384
SHA256db527734a278077767502ef3363bf7ffc107737379088a13e18293a79a6cad11
SHA512b128baa7d3b09f42813a01cbe973a71c4c56549605520c2c4d4b3f80b2c5de34d11474cfc0d58e75a5028eae21beeb775971f5cb962bb6305d893a5581f16ff6
-
Filesize
6KB
MD59e3da64459fb37c02945c66ecb321db2
SHA1d86e3af7df43685ec6c1d8e8b3b23f453ab2588c
SHA256d356698eb81959b6df3595fd6317b07564e3c6e7d8a269401ad393a8f685e980
SHA51251fe2300074a4894603c6ffef335b41b1083a3f1b3f13fda820e28107ee493a05c8007445d8d77ea826fc7a83da34dba008409fbd9cecfa199a32ecf349ad752
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD569a756aeb8f596d21049293d61a39062
SHA1243de8de65d14585a71a53d31381b97007fe2a9d
SHA256a973494d5b61f05cd4c083cc2ede831f2c94763e7691fd3814370526ec1606fe
SHA512a94a9d51fd3a5aa6f1e7abdabb0892221a52718723428ef1c88ac48ea5daba5e1645eb52a0b8d6c082094f7264e81cbca54dda51d0c649114ab72cf4e66b5931
-
Filesize
53KB
MD5edb1479c55054bc8297007c69ba28fac
SHA155c1721d6c37a8f6b9c98653ecd831081210ede0
SHA25615b9457ab8616ee2d918518811ed28b4dd9521082a731fac6e75ed70a0be2bd0
SHA512ebe605eaf0a78fb5ef37fb9284d206d9ba04ba7702e298c73d9630739d33dcd6f4b056fb1f69bf702b605e21463fb5cc37f041f467352d4913dfb0a3c61ceca1
-
Filesize
50KB
MD502cd0535a0c1f4c5bbd5864bdb62991f
SHA1a9c7617caeaac658adbdc948c5446b8b982cafd8
SHA2566f14726920917e8fda3af0bf1016811be0c52b3851fc2d2924455bf93ed105b8
SHA512b4efbbf317e086bf23a6d9ce9925d3ad286c5faff4ee03f1313a077d12ec4e7ebdb2b90affc3135528212adf8bae2e1c4fdcb85fdb7534c43a06752612d5c374
-
Filesize
20KB
MD591033a2366a455113e9b3bb74ea41f78
SHA12e19d8a03cda9877b9f508e3349be258c63e226b
SHA256a0e1ea1c98791f3a0a13d9b8bc055c8aeed1b72061ddce08af70bd1656dc1f00
SHA512477f6f8bbb77496eae48fe3e26db9db003207eaa45e7f411b7fd34935a7acc27bf8d0b8ff8692d5d6aa54dc0784ea96ede1babe8cc1e4f37f3b65400c8909e3e