Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 09:40
Behavioral task
behavioral1
Sample
c075c339bc6ec2ceeee55d7c1d2c791e_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
c075c339bc6ec2ceeee55d7c1d2c791e_JaffaCakes118.exe
-
Size
14KB
-
MD5
c075c339bc6ec2ceeee55d7c1d2c791e
-
SHA1
34a31be6f024d5dcab8e64349943542089ddb745
-
SHA256
cd585e2ad4daa167ccaa6d0785e63ca7a84a2f2e567f11c254260952a59cb847
-
SHA512
052f264a5b26f12f5fee41eb0a29defbdbbd443b426ca322f382608c4302a65be3373ec2023c621e284ad274b5c790b21d2d597156969c990e2dff1afbaf9407
-
SSDEEP
192:bdUi8Fy8RXLCnlTaOnMZ/ANaKFaNJhLkwcud2DH9VwGfctqfKyr9ZCspE+TMwrRj:byi8T5ePaOaNJawcudoD7UGweM4mi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c075c339bc6ec2ceeee55d7c1d2c791e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 1 IoCs
pid Process 3228 b2e.exe -
resource yara_rule behavioral2/memory/3416-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3416-11-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c075c339bc6ec2ceeee55d7c1d2c791e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2e.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5088 msedge.exe 5088 msedge.exe 2080 identity_helper.exe 2080 identity_helper.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3416 wrote to memory of 3228 3416 c075c339bc6ec2ceeee55d7c1d2c791e_JaffaCakes118.exe 86 PID 3416 wrote to memory of 3228 3416 c075c339bc6ec2ceeee55d7c1d2c791e_JaffaCakes118.exe 86 PID 3416 wrote to memory of 3228 3416 c075c339bc6ec2ceeee55d7c1d2c791e_JaffaCakes118.exe 86 PID 3228 wrote to memory of 1436 3228 b2e.exe 87 PID 3228 wrote to memory of 1436 3228 b2e.exe 87 PID 3228 wrote to memory of 1436 3228 b2e.exe 87 PID 1436 wrote to memory of 5088 1436 cmd.exe 93 PID 1436 wrote to memory of 5088 1436 cmd.exe 93 PID 5088 wrote to memory of 3200 5088 msedge.exe 94 PID 5088 wrote to memory of 3200 5088 msedge.exe 94 PID 3228 wrote to memory of 4848 3228 b2e.exe 95 PID 3228 wrote to memory of 4848 3228 b2e.exe 95 PID 3228 wrote to memory of 4848 3228 b2e.exe 95 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 2876 5088 msedge.exe 97 PID 5088 wrote to memory of 5000 5088 msedge.exe 98 PID 5088 wrote to memory of 5000 5088 msedge.exe 98 PID 5088 wrote to memory of 4260 5088 msedge.exe 99 PID 5088 wrote to memory of 4260 5088 msedge.exe 99 PID 5088 wrote to memory of 4260 5088 msedge.exe 99 PID 5088 wrote to memory of 4260 5088 msedge.exe 99 PID 5088 wrote to memory of 4260 5088 msedge.exe 99 PID 5088 wrote to memory of 4260 5088 msedge.exe 99 PID 5088 wrote to memory of 4260 5088 msedge.exe 99 PID 5088 wrote to memory of 4260 5088 msedge.exe 99 PID 5088 wrote to memory of 4260 5088 msedge.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\c075c339bc6ec2ceeee55d7c1d2c791e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c075c339bc6ec2ceeee55d7c1d2c791e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\9AD8.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9AD8.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9AD8.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\c075c339bc6ec2ceeee55d7c1d2c791e_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9C21.tmp\batfile.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ads.regiedepub.com/cgi-bin/advert/getads?x_dp_id=434⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8843d46f8,0x7ff8843d4708,0x7ff8843d47185⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3535622630022452835,17652666831380359983,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:25⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,3535622630022452835,17652666831380359983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,3535622630022452835,17652666831380359983,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:85⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3535622630022452835,17652666831380359983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:15⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3535622630022452835,17652666831380359983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:15⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,3535622630022452835,17652666831380359983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:85⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,3535622630022452835,17652666831380359983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3535622630022452835,17652666831380359983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:15⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3535622630022452835,17652666831380359983,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:15⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3535622630022452835,17652666831380359983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:15⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3535622630022452835,17652666831380359983,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:15⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3535622630022452835,17652666831380359983,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1044
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\selfdel0.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4848
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2c8f30eb-e170-4a27-b95d-694fd1d50eec.tmp
Filesize6KB
MD5436b248ae8356e858d6bc9197a17c55c
SHA1f0402d149e3efdd2af1a8ed7c87d943de33f93b7
SHA256c3a4891fc5fb501168c325f30e2231f06ff49d08a04199f7050af327c61a2087
SHA5127eb8c3a1d7a4bb5033966a1083b16da5dfea25bff52553be4fc0c55c675f7803e3ec142663d0e446396a7f75eca67621069ab78b823c2c781e66963fe6bdb9fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD516b378ab3d6eb51df7dd0e8d79a50965
SHA15e966e0f4e255579a1b913afdea741c5266f5d85
SHA25609e55efc09f56c53d2fb50f08c2681f9b1c6de5ae0ca2308a86eb54f98b2c6a9
SHA512e150a9a8f31f592014e7356032377094c2a37c5c5595907d42bfd4508324871906165fe40e39b6db627ff41721de707f6e2e29423d6b48b77fd4169f1ec696e0
-
Filesize
954B
MD55bca1efa93107f728ae56701a75d9ab4
SHA1c434cc07f446dc8ee7657a96701b49342d79a199
SHA2568f9dc1ee23dad2d845b7641f980638a227b1c0ee992a4a43777abfc311388f88
SHA5123b1a93996413b12c0ad873d06b6379e3d0f22258ab0f61454ec2a6c494a0b8da7f20677b26eef4a4d08e26c47ca3a6d2ad3da5b97e449e16e870a4a549a88899
-
Filesize
5KB
MD5496903c3663d3e92135f08e10b4ac8d2
SHA1d400f6d18d8d2d4c36cc3c4b249b8ca480ef0363
SHA25662519f4fa5002a75b5a489c689ca7fa7c21b7fb0f95e46773f4768c88c5b8c0c
SHA51278db891d99a75d0febe5d6ca0324776c9e6aea7e9b9a98f0be5e8b197f275d16fc168eb8def8d8b89309893d1aea023881d21e30b6643019a661977c70335fc6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD568a517537c4e543ab6c22acfcb0b2f2c
SHA1fe6fb571b40952b41fceb9f66c158254412398e4
SHA256839f0fcfa7130a18f1822c83fdf34efbdff29f7ad265e99f5359be48b3396198
SHA5123ec49b1228a87990733b54849724eea28d800661aa0c7d234dec8b5690447048787b6952a0adcff4aa2cd735c8f8c695e266f7d416785529f6b16fbd57994e43
-
Filesize
8KB
MD56a7329f15480d4ca075dd593c7572d14
SHA1cbe94a895b719efdb2309e2d3cdd469c5c5fef55
SHA25650c8fe18a33985b19b5a88d9d6d94193079aea9cfaa89be9b28ec771e04e4670
SHA512ba0a5b9fa41faadebe8124d44e03bb05fb5e6a9eec4052c90fc2d30852200e789b6183afd9deeea64c8aa944b8f28d6ef983dd64f1aaf581d930a98d5240f874
-
Filesize
77B
MD5ba7c5c724c70ee9f04c4933b18083e49
SHA1d6c6dcbe9cbfb829296dc21ff41292cac64fdc9c
SHA256aad13997529ce15c8b987178057a01b5e8236f0daf5b94f29dabaa778105388c
SHA512d34f0f812c72580e1c505da5dfa636e18fea800cbf36e2ed11bfc423cf7a871981991b3a7e65e45b54aeb15f3f37f8eaef2e408a03585f2c46c95fbcbf63e09b
-
Filesize
158B
MD5a0257a33dab61c9c66335f5850473343
SHA1dfc8bcefbf4cbf3eb73bf88209514e5fae535667
SHA256bdc3e8ab1670b4cfd868a780695839d5f2e497eec7af678ef85c209c2f925845
SHA512476c8d9dd03bb4aeea18a45179133f08c66539fb389e55e53332e956b62fbdc1384c8404ef3efa7c2c46eba8b030c0e7f56a2caf8b0651fa4f6e91b464174bfa