Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:07
Behavioral task
behavioral1
Sample
eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe
-
Size
508KB
-
MD5
eabaa43811f4e4e0603be464824ffcb5
-
SHA1
bd1781657865a914c51427c5818c5df06fbdd20b
-
SHA256
8cbf3e85067779d5d2a5cfa995941495c03c8155e5c4c7ef8932ebc5a98b1ba1
-
SHA512
dddb967a34a4e2be62aee52ce17592f9b5c04083856acef8ea8427c1c26e7bb228b560eb3f854c95888ff4eae0eba240b6b1c56156f8c8a5cfff9e894c541db5
-
SSDEEP
12288:8B41AjeXmRjw2IolsDcVGPfCchG2n4bLiCb3sJr+CIO/Md:8218eXmRE2I4sIsfC0G2Q2DB+Xf
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\W: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\X: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\B: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\L: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\R: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\S: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\T: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\O: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\Q: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\M: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\J: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\K: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\N: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\A: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\E: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\G: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\H: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\I: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\P: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\V: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\Y: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe File opened (read-only) \??\Z: eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1604 msedge.exe 1604 msedge.exe 748 msedge.exe 748 msedge.exe 3596 identity_helper.exe 3596 identity_helper.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 868 eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe 868 eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 868 eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe 868 eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 868 eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 868 wrote to memory of 748 868 eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe 82 PID 868 wrote to memory of 748 868 eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe 82 PID 748 wrote to memory of 3536 748 msedge.exe 83 PID 748 wrote to memory of 3536 748 msedge.exe 83 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 4360 748 msedge.exe 84 PID 748 wrote to memory of 1604 748 msedge.exe 85 PID 748 wrote to memory of 1604 748 msedge.exe 85 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86 PID 748 wrote to memory of 4892 748 msedge.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eabaa43811f4e4e0603be464824ffcb5_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.51rwx.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffafe8546f8,0x7ffafe854708,0x7ffafe8547183⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:83⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:13⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:13⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:13⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:13⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:83⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:13⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:13⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:13⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:13⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2056 /prefetch:13⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:13⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,16496360614652400778,11780618895588259309,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
5KB
MD56d8baec9a2236f9785631d99095eb34d
SHA1def02a92a1d5caaa5838921cc244bae34cb0be33
SHA256622888b698a304d9e4f80d00943afe5d1c23fb35da230c189352ab69a66f5013
SHA512cef04dd7c03b7a75130706a11fdd251060855e2fffed35ad693f91c13dde8c747d3aed6d28f68bed3a13f4b79ab3aaf73229a32607ce4442a1fbfe85e19e3fae
-
Filesize
6KB
MD58ba50ba55f34023eb9126644d77db011
SHA113a410b300fc1d22d6023d4f214f6548931b7ca2
SHA256376d964419b2d05551308809cfe1491f14216931b133cb4ace4e2ce9e6dfae2e
SHA51214d912435c2d2bb9829e3e7e13477b68aa542d800dd20207db497393d75247210b7f7bc1dcecb901e391e667044b6d381ff5a275510fef03680f17cee2e0fa2e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58eae6e3c6c6e7f143e89617f5bac3bcd
SHA19ce8a1b863cf5233eaf3d7d83c8fd546fccc067e
SHA25629b7c7127108208c50936e037b72c1ba76c36073ab138b8df09af09253d47cbe
SHA5128095c51a4a5dddc34be39b7215868273d5fbd39581b89628cee2a5c99fbb0bd3b8d45792cf0a3343f1b6c044b56ec30e31f5ccf03199b7f1658cad3f79ca9e4f
-
Filesize
8KB
MD5ca5afa3d879c19adf5d675cb0698c2a0
SHA1146c4b99c0da3e75871929c591b1ac91b2c2e6f1
SHA256b4a80cda1644933ff6c11d295bc5f20877ce902184ce4af86b489bc18237b94c
SHA512276cd2c2af0230559e5af766854645a418548b17ff4bfb2c4a0872c88aeff4810d05f329064920b293b9ac15e0ec7d62c4c642c3a5e627e97d271ce8260a7f9d