Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
07cd602a1ab3bb35efa797f5e696c620_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07cd602a1ab3bb35efa797f5e696c620_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
07cd602a1ab3bb35efa797f5e696c620_JaffaCakes118.exe
-
Size
428KB
-
MD5
07cd602a1ab3bb35efa797f5e696c620
-
SHA1
490022cc826036057d775654f262f3a8cf08d067
-
SHA256
3a049ed133aaa34a8c6a4005dd0987cf788e21ef3dcb08b56881ae8cf386fb9e
-
SHA512
2a7d44d20e7476ebed035b3e1802fd553263b6b445c20ee64caf8c5434805fa7bfd4e3d9273eb4c953076da0ba7dd117f5a7e884e190349463df8136bbfba433
-
SSDEEP
6144:6HGHd3toKTBdFbpjbRZOZZNgoKdirGYPmLCEip3k3yTGMWnDXpa:6m9uKTXFb5TON6dirGYqk3yyTGM6pa
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07cd602a1ab3bb35efa797f5e696c620_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3304 msedge.exe 3304 msedge.exe 1576 identity_helper.exe 1576 identity_helper.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1260 wrote to memory of 3304 1260 07cd602a1ab3bb35efa797f5e696c620_JaffaCakes118.exe 84 PID 1260 wrote to memory of 3304 1260 07cd602a1ab3bb35efa797f5e696c620_JaffaCakes118.exe 84 PID 3304 wrote to memory of 4216 3304 msedge.exe 85 PID 3304 wrote to memory of 4216 3304 msedge.exe 85 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3224 3304 msedge.exe 87 PID 3304 wrote to memory of 3256 3304 msedge.exe 88 PID 3304 wrote to memory of 3256 3304 msedge.exe 88 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90 PID 3304 wrote to memory of 4824 3304 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\07cd602a1ab3bb35efa797f5e696c620_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07cd602a1ab3bb35efa797f5e696c620_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=07cd602a1ab3bb35efa797f5e696c620_JaffaCakes118.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80f3646f8,0x7ff80f364708,0x7ff80f3647183⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:23⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:83⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:13⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:13⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:13⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:83⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:13⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:13⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:13⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:13⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:13⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:13⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,14363174065085897156,10472479476674907694,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=07cd602a1ab3bb35efa797f5e696c620_JaffaCakes118.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:3804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80f3646f8,0x7ff80f364708,0x7ff80f3647183⤵PID:1088
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD549d2be51cb15c6fb286e63c0ae4a0f7e
SHA1b5f1883b8dd378ef96d6b0b2a7477026f17935eb
SHA256343e9c00c2beef1f73c9c4d31ad231d73565f4fc025e5aefb7003257fde45966
SHA512d3bcf86308f872645abe70a0bd6cf379c656696b00784aaf560373c4a56e9bb9f19436af372f1f56c7eea053c7e9a40bedc3dfbb79970fa1c4777f3ed246cfbf
-
Filesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
Filesize
6KB
MD5cc55d579be09461e821b5a5cf88102d6
SHA119aff18788a9723769473aeda8c20b5543e1492f
SHA256f47a225e2e6d9bf24abdfb0092a66afa9ff6da3c706809c0668b4d10a14ea78b
SHA51211bdf1b4b3d1af6e20a2a3de46df79b53624d54ab6859b6f92f6ba740bcf0132c886d3678da40b025114c62ebe3f16ccd7068497d3d577be20bae54536632d3f
-
Filesize
5KB
MD5e56d1a7158385d364685e1b64488bf2f
SHA19e021cfaca42c2252c9fb61c3d3de53baed2b1f6
SHA256f247bd05c074ff6b3b2996ba9ebce37843b75218c6091a123f0eeae4013de4ce
SHA5125ea3c669147fc60a53257d74c2fdb675b3dee876432511eced54d8e073960884c2d1b6791886548ff79bbd404c5331fc569d477c4c470197cf1c0b89b01563d3
-
Filesize
6KB
MD56b3e77a6fc31bc8bcabe2b429b326d83
SHA1d7387aac9fde5269dbfc871551aec0ea5f1f163b
SHA256cd1775287679fe19077e04b2b0d949978fe3682d5b776b70b7767207fb0bec59
SHA51207bce26068044fe797b0e4cf2bd73408e2f2a360a16f9fc5597ab91ba0868305b9c3414776bbb63e77cca8c4c36c3b55f751fd388f002e9234501dd53719b038
-
Filesize
371B
MD5024125aa1132cdbe6354768cb963b520
SHA17ce67b956f501459ceaaf438cdf410850787702d
SHA256c26c8498b125422dd9bf8a76799fc127edc93de6a3c8f019527e23c07cfc72c4
SHA512e7dbd4e22f882ee82df2752677e8e8777dee24878f2a7bce3faf891ffc6cac352cfff4eeab32c3cee73077b657db2a6196ea0bc1a2d28d2003f80c887afbe172
-
Filesize
371B
MD5f96d3e4f3e488992a7d4df1384f3a3b2
SHA13d02f54ccdf6801b7e86e3bc2cc10ab5f5b99e02
SHA25672f93c0869bc43d11dcf5068cfb695d1bb636ec927a51a5a3f358c316c583834
SHA51211a488691ca07270f332091b4cb339d664b185bd8ef4ced6fa68db44a9a4a5b69c454d4de7836f18cbb44bc6eb83aa45b48b3060053da888b379858731bcfe26
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e380b864ecb093cf135b8703d0a19fab
SHA1f13f758b8d46bfbae544216952162debd0965b9d
SHA2560056705ef43ab2f03e89d96b57e2588fea7c4e95a8fa013ee0afd6c1d997edf4
SHA512c74cd7eb902e2084e2457df44240c30d92139e75f70dbc80675afdee84948ca921c62b950c01244bec3c0fae47353233f4508d3b676cba4508eca51bda564125