Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 04:29
Static task
static1
Behavioral task
behavioral1
Sample
2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe
-
Size
375KB
-
MD5
2ad561e9bb9f780f56d5e7a280574432
-
SHA1
e6bc833d62ef0ec1e08674a0a8707e3ce2f09007
-
SHA256
54f33fa555874b30e6045c4bfd467779b0683e1bcafb69d0987c59019203c9d3
-
SHA512
8b74c1f6df444ce101102e3b036e2f77c9e0b1ebb085db2de8e45905ab10b47c845040548901632c130c4db6b4403a5905d864c461cb9bed6cd5fe49fc0ce064
-
SSDEEP
6144:dOm2B8bwepKH3435zfwJyJLcE0NBY5yoFdJraQqZC6P1ylyiec3fE:dOm2BgpKHo3lUyh0azJCZdylZjfE
Malware Config
Extracted
njrat
0.7d
HacKed
212.192.241.42:5552
34adf4afddd35097c6bf7951c5baad3a
-
reg_key
34adf4afddd35097c6bf7951c5baad3a
-
splitter
|'|'|
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\putty.exe\"," server.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\putty.exe\"," 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5064 netsh.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\34adf4afddd35097c6bf7951c5baad3a.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\34adf4afddd35097c6bf7951c5baad3a.exe server.exe -
Executes dropped EXE 2 IoCs
pid Process 2736 server.exe 4804 server.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\34adf4afddd35097c6bf7951c5baad3a = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\34adf4afddd35097c6bf7951c5baad3a = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe -
pid Process 4016 powershell.exe 2876 powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 220 set thread context of 1692 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 94 PID 2736 set thread context of 4804 2736 server.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings server.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 1328 powershell.exe 1328 powershell.exe 3560 powershell.exe 3560 powershell.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 4016 powershell.exe 4016 powershell.exe 4924 powershell.exe 4924 powershell.exe 5284 powershell.exe 5284 powershell.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2736 server.exe 2876 powershell.exe 2876 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1328 powershell.exe Token: SeIncreaseQuotaPrivilege 1328 powershell.exe Token: SeSecurityPrivilege 1328 powershell.exe Token: SeTakeOwnershipPrivilege 1328 powershell.exe Token: SeLoadDriverPrivilege 1328 powershell.exe Token: SeSystemProfilePrivilege 1328 powershell.exe Token: SeSystemtimePrivilege 1328 powershell.exe Token: SeProfSingleProcessPrivilege 1328 powershell.exe Token: SeIncBasePriorityPrivilege 1328 powershell.exe Token: SeCreatePagefilePrivilege 1328 powershell.exe Token: SeBackupPrivilege 1328 powershell.exe Token: SeRestorePrivilege 1328 powershell.exe Token: SeShutdownPrivilege 1328 powershell.exe Token: SeDebugPrivilege 1328 powershell.exe Token: SeSystemEnvironmentPrivilege 1328 powershell.exe Token: SeRemoteShutdownPrivilege 1328 powershell.exe Token: SeUndockPrivilege 1328 powershell.exe Token: SeManageVolumePrivilege 1328 powershell.exe Token: 33 1328 powershell.exe Token: 34 1328 powershell.exe Token: 35 1328 powershell.exe Token: 36 1328 powershell.exe Token: SeIncreaseQuotaPrivilege 1328 powershell.exe Token: SeSecurityPrivilege 1328 powershell.exe Token: SeTakeOwnershipPrivilege 1328 powershell.exe Token: SeLoadDriverPrivilege 1328 powershell.exe Token: SeSystemProfilePrivilege 1328 powershell.exe Token: SeSystemtimePrivilege 1328 powershell.exe Token: SeProfSingleProcessPrivilege 1328 powershell.exe Token: SeIncBasePriorityPrivilege 1328 powershell.exe Token: SeCreatePagefilePrivilege 1328 powershell.exe Token: SeBackupPrivilege 1328 powershell.exe Token: SeRestorePrivilege 1328 powershell.exe Token: SeShutdownPrivilege 1328 powershell.exe Token: SeDebugPrivilege 1328 powershell.exe Token: SeSystemEnvironmentPrivilege 1328 powershell.exe Token: SeRemoteShutdownPrivilege 1328 powershell.exe Token: SeUndockPrivilege 1328 powershell.exe Token: SeManageVolumePrivilege 1328 powershell.exe Token: 33 1328 powershell.exe Token: 34 1328 powershell.exe Token: 35 1328 powershell.exe Token: 36 1328 powershell.exe Token: SeDebugPrivilege 3560 powershell.exe Token: SeIncreaseQuotaPrivilege 3560 powershell.exe Token: SeSecurityPrivilege 3560 powershell.exe Token: SeTakeOwnershipPrivilege 3560 powershell.exe Token: SeLoadDriverPrivilege 3560 powershell.exe Token: SeSystemProfilePrivilege 3560 powershell.exe Token: SeSystemtimePrivilege 3560 powershell.exe Token: SeProfSingleProcessPrivilege 3560 powershell.exe Token: SeIncBasePriorityPrivilege 3560 powershell.exe Token: SeCreatePagefilePrivilege 3560 powershell.exe Token: SeBackupPrivilege 3560 powershell.exe Token: SeRestorePrivilege 3560 powershell.exe Token: SeShutdownPrivilege 3560 powershell.exe Token: SeDebugPrivilege 3560 powershell.exe Token: SeSystemEnvironmentPrivilege 3560 powershell.exe Token: SeRemoteShutdownPrivilege 3560 powershell.exe Token: SeUndockPrivilege 3560 powershell.exe Token: SeManageVolumePrivilege 3560 powershell.exe Token: 33 3560 powershell.exe Token: 34 3560 powershell.exe Token: 35 3560 powershell.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 220 wrote to memory of 1328 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 86 PID 220 wrote to memory of 1328 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 86 PID 220 wrote to memory of 1328 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 86 PID 220 wrote to memory of 3560 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 89 PID 220 wrote to memory of 3560 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 89 PID 220 wrote to memory of 3560 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 89 PID 220 wrote to memory of 4328 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 93 PID 220 wrote to memory of 4328 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 93 PID 220 wrote to memory of 4328 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 93 PID 220 wrote to memory of 1692 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 94 PID 220 wrote to memory of 1692 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 94 PID 220 wrote to memory of 1692 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 94 PID 220 wrote to memory of 1692 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 94 PID 220 wrote to memory of 1692 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 94 PID 220 wrote to memory of 1692 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 94 PID 220 wrote to memory of 1692 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 94 PID 220 wrote to memory of 1692 220 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 94 PID 4328 wrote to memory of 4016 4328 WScript.exe 95 PID 4328 wrote to memory of 4016 4328 WScript.exe 95 PID 4328 wrote to memory of 4016 4328 WScript.exe 95 PID 1692 wrote to memory of 2736 1692 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 99 PID 1692 wrote to memory of 2736 1692 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 99 PID 1692 wrote to memory of 2736 1692 2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe 99 PID 2736 wrote to memory of 4924 2736 server.exe 101 PID 2736 wrote to memory of 4924 2736 server.exe 101 PID 2736 wrote to memory of 4924 2736 server.exe 101 PID 2736 wrote to memory of 5284 2736 server.exe 103 PID 2736 wrote to memory of 5284 2736 server.exe 103 PID 2736 wrote to memory of 5284 2736 server.exe 103 PID 2736 wrote to memory of 736 2736 server.exe 106 PID 2736 wrote to memory of 736 2736 server.exe 106 PID 2736 wrote to memory of 736 2736 server.exe 106 PID 2736 wrote to memory of 4804 2736 server.exe 107 PID 2736 wrote to memory of 4804 2736 server.exe 107 PID 2736 wrote to memory of 4804 2736 server.exe 107 PID 2736 wrote to memory of 4804 2736 server.exe 107 PID 2736 wrote to memory of 4804 2736 server.exe 107 PID 2736 wrote to memory of 4804 2736 server.exe 107 PID 2736 wrote to memory of 4804 2736 server.exe 107 PID 2736 wrote to memory of 4804 2736 server.exe 107 PID 736 wrote to memory of 2876 736 WScript.exe 108 PID 736 wrote to memory of 2876 736 WScript.exe 108 PID 736 wrote to memory of 2876 736 WScript.exe 108 PID 4804 wrote to memory of 5064 4804 server.exe 110 PID 4804 wrote to memory of 5064 4804 server.exe 110 PID 4804 wrote to memory of 5064 4804 server.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.82⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.82⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Ikjuwwswk.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Local\putty.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
-
C:\Users\Admin\AppData\Local\Temp\2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5284
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Ikjuwwswk.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Local\putty.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
-
-
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp\server.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5064
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2ad561e9bb9f780f56d5e7a280574432_JaffaCakes118.exe.log
Filesize1KB
MD56dd2b2e332f641268ade3fbee81828a0
SHA1fbb9ba6b2d8644acc81d1813df8394eb16935058
SHA2564005814778c17ce5bb518ba97a0e3a7547e9fd54c736b45b145d51ae38e34f46
SHA51230d7ef784b86b5184fd5d851bd3725325ffef723815107008b159b43b3e40fbbfc00f5ce071113aaa11334d5878e86da0bd4bef5d3d403622da4028311d1884f
-
Filesize
2KB
MD50774a05ce5ee4c1af7097353c9296c62
SHA1658ff96b111c21c39d7ad5f510fb72f9762114bb
SHA256d9c5347ed06755feeb0615f1671f6b91e2718703da0dbc4b0bd205cbd2896dd4
SHA512104d69fc4f4aaa5070b78ada130228939c7e01436351166fe51fe2da8a02f9948e6d92dd676f62820da1813872b91411e2f863c9a98a760581ec34d4aa354994
-
Filesize
19KB
MD5c0cb1802e7b6667ac46ef8d75a22910c
SHA1c7c483c8e096e801dc19c5d5f340fc2a11a079eb
SHA25618b4d3308cbd39830bac522d46c68d613dca14ebaf60acb9ff4e38c34fad7814
SHA512641df4f55854c1f3f0ea7f5192c12934833cb6cb95046833ce4130139f2b13dd26f046fc7860df164960dc75b5a7f348733fde89933ca753bad7d6ec79d7b016
-
Filesize
18KB
MD53cea0d00037dd549cefd12517e8b6270
SHA10e5322a80cd78e8f4653402be1ac641ee28f59b0
SHA2568fee9505b5c3e8b78fda8e13e0b13e10f22c2adaa3a45548c0d28c54d01075ec
SHA51267a9b9c7739149c9cf322a521f848df8bd3cc1936125a772c3eca7b8e8272271d1089a253e0f8da129f1c1d6039544f879baaa6dbe5651bc78bf043ce44d71b1
-
Filesize
19KB
MD540fb5094412dbd0e713cbc457cb96950
SHA1d45cfd29a855209c968e0f1085a80cdf0745c883
SHA256a75ef623defe458aa8931b9673355bc48527e54903c0219da46f03e6c91403fd
SHA51277c8b394ddebea7dda5de2d883324833371d288d99d220dc267fd84e2ca65c0f365c9c1d5f66991d1466fa28811276c87a0bf4ceb3a7f9a9680dc9f8caf6e96b
-
Filesize
19KB
MD58d37ae94441b8f905caae6af8f9f4e88
SHA15128bdfaef6e80485c007f2e1a460095286e6353
SHA256ba2386f6aa3450e153577379afe977e3b723c5bcfedd58e3c4ed8c29c04dfa5b
SHA5129277e388353e3cbe55464ae5f626dfdffb12c5c3919d0cbf0c2a6403427b9a04cbba5f174e5ba49f9b17c6a08c9ff2a1207d06f472d530bffd95a285d47da5d7
-
Filesize
19KB
MD5c0e24aced1105462de3fb4d0c00daea8
SHA1641355ce78acca1e0ef1a3bbe193f773514f8587
SHA2569503f0dcf151940067f942e36efd92edd337423cde64becf0283fcb5408a778d
SHA512cb012433ca9488bd855ade1e5094b3641cb495c1f29e83fd66485d3346133aed38214bc078c16aabcf940a5cc61b9c870892677f751959cf4fe2b50a9834cbd9
-
Filesize
133B
MD53a35a8049e1d1c960d83727fcdc0e1b3
SHA141acf6abf00a160e0d4795bc080f540620525f76
SHA2569be0a227c73471c6797c07b45970b39954ee5715cee41d029c53239cac0578ee
SHA512256b222634a7acf9e69fe170d97236128f28aa11cb67d6a41e4cdbcfe8c982229801f0c77ae6075665ef4385f93fca00d3a7d5dbaf48e58aea966378c3ac1385
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
375KB
MD52ad561e9bb9f780f56d5e7a280574432
SHA1e6bc833d62ef0ec1e08674a0a8707e3ce2f09007
SHA25654f33fa555874b30e6045c4bfd467779b0683e1bcafb69d0987c59019203c9d3
SHA5128b74c1f6df444ce101102e3b036e2f77c9e0b1ebb085db2de8e45905ab10b47c845040548901632c130c4db6b4403a5905d864c461cb9bed6cd5fe49fc0ce064