Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 16:03
Behavioral task
behavioral1
Sample
74be88eedea2d2c029cc59fe6f256243_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
74be88eedea2d2c029cc59fe6f256243_JaffaCakes118.exe
-
Size
585KB
-
MD5
74be88eedea2d2c029cc59fe6f256243
-
SHA1
124ae0bf9911ecb3cb6da094b0217e83b26d493f
-
SHA256
8263ac7cd80eb873d33d568e53d823b010484e60cbbeca91008852f169f388cd
-
SHA512
ed4f87a0b32dbd5c93e0fa5f9ae04344a5e2dcdb7b3c4d8f7eb1073b6900c05452730395f68b9a7b19fa53b02a68ddd0ec3ca2620ba9655269a0b02f9cfe3ea2
-
SSDEEP
12288:u+xuLMpM8SfWHuYos5wMaX3t3hRvNC77ZF9dPhPWAo:cv8SfG/SnxRS79dPVW
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2940-0-0x0000000000400000-0x000000000057C000-memory.dmp upx behavioral2/memory/2940-3-0x0000000000400000-0x000000000057C000-memory.dmp upx behavioral2/memory/2940-125-0x0000000000400000-0x000000000057C000-memory.dmp upx behavioral2/memory/2940-224-0x0000000000400000-0x000000000057C000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\avp.dat 74be88eedea2d2c029cc59fe6f256243_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74be88eedea2d2c029cc59fe6f256243_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 1424 msedge.exe 1424 msedge.exe 680 identity_helper.exe 680 identity_helper.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2940 wrote to memory of 1424 2940 74be88eedea2d2c029cc59fe6f256243_JaffaCakes118.exe 87 PID 2940 wrote to memory of 1424 2940 74be88eedea2d2c029cc59fe6f256243_JaffaCakes118.exe 87 PID 1424 wrote to memory of 4352 1424 msedge.exe 88 PID 1424 wrote to memory of 4352 1424 msedge.exe 88 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4984 1424 msedge.exe 89 PID 1424 wrote to memory of 4608 1424 msedge.exe 90 PID 1424 wrote to memory of 4608 1424 msedge.exe 90 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91 PID 1424 wrote to memory of 1752 1424 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\74be88eedea2d2c029cc59fe6f256243_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74be88eedea2d2c029cc59fe6f256243_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://avi-player.ivefound.com/appdata/error.asp?key=001A-0007-07E8-0012-0029-0004-037F&version=3,0&bws=iexplore&so=-1&ah=393854&uptime=23-7-2024_23-50-462⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe97da46f8,0x7ffe97da4708,0x7ffe97da47183⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,2092086258259473505,13347733626116373832,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:23⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,2092086258259473505,13347733626116373832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,2092086258259473505,13347733626116373832,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:83⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2092086258259473505,13347733626116373832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1528 /prefetch:13⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2092086258259473505,13347733626116373832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:13⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2092086258259473505,13347733626116373832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:13⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2092086258259473505,13347733626116373832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:13⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2092086258259473505,13347733626116373832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:13⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2092086258259473505,13347733626116373832,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:13⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,2092086258259473505,13347733626116373832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6204 /prefetch:83⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,2092086258259473505,13347733626116373832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6204 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2092086258259473505,13347733626116373832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:13⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2092086258259473505,13347733626116373832,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:13⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,2092086258259473505,13347733626116373832,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6028 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD55476a911c6cb7e05c4c60ec2fb69b8fb
SHA116d6e782b04116bda1397667e0928d087fcc0240
SHA256e390addf572d16a68f012069441f8134696238ba1e58de74d150ae3fa97db0f3
SHA5121b7fbfdb25946ecc8e9191cf6c8531cb7d59aee73b1e3d9a5a6316ce9507272129addf072513b88e9fc8245eb69d68034cf6f82edc722529ae7487ccb0e77403
-
Filesize
973B
MD527fe0abf793a2c899686512dc1f94ae0
SHA198de5ae70fa72d3e0c0b7d6e045236035caada0d
SHA2566b9a9c729b505fd1b37208c535cd02ce0a3ced2176b2d2fa816fd03e046ca330
SHA512b012dbf7ccda1cf14c3a2215e663469053cddf84853b78038c00cb8a26968d8570f5f7f474af52520ee6b47d94eef9e182867ba0907cbfe6d70d7a4ab9a35c7e
-
Filesize
5KB
MD569a495a8df68dca371445d22535231f0
SHA1a515bbe27ff28f09d96c9ae8553dcbbdd2861037
SHA2568305e7a855aa0af2937c67e8a0d9b8b9f97ee2e41eba6fd6ed4217b9b4a2e406
SHA5128d00e7ad4b8241a267485e7f0efffd7936199403ab7c4363b3caff572fbf121fe15cb21b207998a87d3dfbea16cbbe0b7db6e00f5fa1f174c7a3c4165a4fb747
-
Filesize
6KB
MD5a3b3d856dab8456c60e2e41cc8115e42
SHA1054ef0fc5a8c0ed83c1672ef6bae879252893bfc
SHA2568c3dc70d4980cc89fd3ba838d760238dc99feff1a55df2b84dba27a19c7d113b
SHA5126b78244b0711fac80384ce4426dd8efd4b93fa0cdaa79290ff395f5c4f6db729319f2afb157cbeec4213a3dbbf4054719417b8be74d7849d77e66b848e43d535
-
Filesize
1KB
MD57b7b7e4ef8480935564f738eab9777b6
SHA1da8f13316713b15543a624dbeda157720eb09aba
SHA25696fc82e1779e6fdcbd50a89971d3db8c70f7933dba15812f044d25e14f9183b6
SHA51213fd7675c8c91986e009434572c8187158a84d0c7807b14770937eff9bae5efb58deba65a2f46583aa3afc4db4f3ada4e77c637ab71c0cfbd0925d46f4323ed5
-
Filesize
1KB
MD5c504312b9a0a9398b509bf264398b12c
SHA187c9015bf5030d6cac0f20a5cec95bd4341a0364
SHA25692c57642828a6096913c900015dfbfd31e6e98bef2d5d6a56e364a35e7bb2e3d
SHA512615373224c38627afcf2269bb0efac3b3f19c16704b36f23c6358e5af11f64c42accc7a2df40ddd14cfc7cc7fa37de49f614597e55e2740e83195e85142a4711
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD51c31c992a9fca8527f8e5022d00b5d4d
SHA1cbbbc2ad3d7510da9fff5d8561e4b56dc8b5c99e
SHA2567a8d27156097b50ad843cb52b902ee2e762568497284f4a3c0839d2b2bf9e29e
SHA51281c83614979578c0724d2427769d45f23c6d9eb81a111b596ba3b4f07b35481f3c8bfabc829c4bb5c486be8f950df5689a2aafcac904564b6ba9a4e8f5560efe
-
Filesize
36B
MD5beb378f05c8f685cad647b02b1664c54
SHA1043764d8e79d3d68d72e6a460a3761145d80567a
SHA256a8e4d63c154126c596ccde467f1230e4064d27df340c763c961c3577a4fe7ac9
SHA512880dab646f11199fe8a847b1b9bb49e89596a3aeb7c922c087063f87e6faba0bde10106564f4c17f1f0bd27afc67ad0f8bc74e883b8c19b30c8d3ec9bd249f9a