Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
4098a5d37781d937a041b2a61ec8ade7_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
4098a5d37781d937a041b2a61ec8ade7_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
4098a5d37781d937a041b2a61ec8ade7
-
SHA1
3c4f590867773fe31c7f512fc0bf6552b5fb481e
-
SHA256
42ff900d002e0e9791da1e02e751bff013f54bec48294455c07eb7bfe0a19371
-
SHA512
55fd99c7f05216700dc102814ca460ef81b6ef7d8c740faffdaf196f2a5c6a20e1d7f34471d0af4a8271b50b3aad33ba60cd4a1df3653f088d4062e338915f27
-
SSDEEP
24576:hrJKUKRvzuei/bc6EGn5u5TtyJ8adjCzjyhhcDkPQcKiwMH5yUKc5thLfrXa7sju:h1Kbxzur/bc6/nRJ/aOheDkPQcKiwMHk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 936 crpAB83.exe 1260 hpet.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hahpjplbmicfkmoccokbjejahjjpnena\1.2_0\manifest.json hpet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4098a5d37781d937a041b2a61ec8ade7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crpAB83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpet.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page Before = "http://go.microsoft.com/fwlink/p/?LinkId=255141" hpet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page Before = "http://go.microsoft.com/fwlink/?LinkId=54896" hpet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://search.b1.org/?bsrc=hmior&chid=c162341" hpet.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://search.b1.org/?bsrc=hmior&chid=c162341" hpet.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1260 hpet.exe 1260 hpet.exe 1260 hpet.exe 1260 hpet.exe 1260 hpet.exe 1260 hpet.exe 1260 hpet.exe 1260 hpet.exe 1260 hpet.exe 1260 hpet.exe 4428 msedge.exe 4428 msedge.exe 552 msedge.exe 552 msedge.exe 1720 identity_helper.exe 1720 identity_helper.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 936 crpAB83.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 716 4098a5d37781d937a041b2a61ec8ade7_JaffaCakes118.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 936 crpAB83.exe 552 msedge.exe 552 msedge.exe 936 crpAB83.exe 936 crpAB83.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 936 crpAB83.exe 552 msedge.exe 552 msedge.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe 936 crpAB83.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 936 crpAB83.exe 936 crpAB83.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 716 wrote to memory of 936 716 4098a5d37781d937a041b2a61ec8ade7_JaffaCakes118.exe 86 PID 716 wrote to memory of 936 716 4098a5d37781d937a041b2a61ec8ade7_JaffaCakes118.exe 86 PID 716 wrote to memory of 936 716 4098a5d37781d937a041b2a61ec8ade7_JaffaCakes118.exe 86 PID 716 wrote to memory of 1260 716 4098a5d37781d937a041b2a61ec8ade7_JaffaCakes118.exe 87 PID 716 wrote to memory of 1260 716 4098a5d37781d937a041b2a61ec8ade7_JaffaCakes118.exe 87 PID 716 wrote to memory of 1260 716 4098a5d37781d937a041b2a61ec8ade7_JaffaCakes118.exe 87 PID 716 wrote to memory of 552 716 4098a5d37781d937a041b2a61ec8ade7_JaffaCakes118.exe 91 PID 716 wrote to memory of 552 716 4098a5d37781d937a041b2a61ec8ade7_JaffaCakes118.exe 91 PID 552 wrote to memory of 3568 552 msedge.exe 92 PID 552 wrote to memory of 3568 552 msedge.exe 92 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 1192 552 msedge.exe 93 PID 552 wrote to memory of 4428 552 msedge.exe 94 PID 552 wrote to memory of 4428 552 msedge.exe 94 PID 552 wrote to memory of 3344 552 msedge.exe 95 PID 552 wrote to memory of 3344 552 msedge.exe 95 PID 552 wrote to memory of 3344 552 msedge.exe 95 PID 552 wrote to memory of 3344 552 msedge.exe 95 PID 552 wrote to memory of 3344 552 msedge.exe 95 PID 552 wrote to memory of 3344 552 msedge.exe 95 PID 552 wrote to memory of 3344 552 msedge.exe 95 PID 552 wrote to memory of 3344 552 msedge.exe 95 PID 552 wrote to memory of 3344 552 msedge.exe 95 PID 552 wrote to memory of 3344 552 msedge.exe 95 PID 552 wrote to memory of 3344 552 msedge.exe 95 PID 552 wrote to memory of 3344 552 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4098a5d37781d937a041b2a61ec8ade7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4098a5d37781d937a041b2a61ec8ade7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\crpAB83.exe/S /notray2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:936
-
-
C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe-home -home2 -hie -hff -hgc -spff -et -channel 1623412⤵
- Executes dropped EXE
- Drops Chrome extension
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.4shared.com/file/s-63r0R7/Counter_Strike_16_Install__Ful.html?ref=downloadhelpererror2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff267146f8,0x7fff26714708,0x7fff267147183⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16597437625979411849,15209527449566475176,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:23⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,16597437625979411849,15209527449566475176,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,16597437625979411849,15209527449566475176,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:83⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16597437625979411849,15209527449566475176,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16597437625979411849,15209527449566475176,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:13⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16597437625979411849,15209527449566475176,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:83⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16597437625979411849,15209527449566475176,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16597437625979411849,15209527449566475176,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:13⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16597437625979411849,15209527449566475176,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:13⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16597437625979411849,15209527449566475176,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:13⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16597437625979411849,15209527449566475176,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:13⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16597437625979411849,15209527449566475176,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2816
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
6KB
MD51e5f72c31d30f80b5a052592f3731748
SHA1b7576f740f9119bb8b0a337eaadb10e96d8e2bfe
SHA256727c02c28df7bc547dbcfacd4dba4950374cf2fcd619cb51ce1ebe8522f32d1e
SHA5125206b5cddc8a8ec0594b6dc80d7352a2742b30a49a48ee85782fd0f1ae1286f1f92f9afe3f56577b70d9556ce3b281917aa1c18b7e0dfa9642d0ab64f5a4432a
-
Filesize
6KB
MD5620b2ffc61ead1a1ac1ca799c72a5732
SHA12762c1b4e6915eec6e83a282ff92e75f600dca48
SHA256ef5f6e06634eae201dbda6289e82bddd5a1b3dda584496397a86fbdd36fdb2d0
SHA5124e83b02c09c4eba96616abb6baa6d45024ad8cca2f70c8d093d4e39435e4a7a40c599adcf23cf3fa52a0735aecced333a09bf7f95e5e4b86c0eec9aac4174226
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55a1b4b91b07c9d5e049bb8f35b6cd858
SHA1818ba8404c1cd41e747bdb75b6ff1cb98a8a9b15
SHA25601b1615ed88beed212d459823b6a124d3801b41a838b5cf14127d9f33081ec8b
SHA5121138f55d9cd918bb75110dd84f7519ee1b697b2f80da19cb2dd599696a074f4727c59633f15ef4b1adf577b1d8746928398ba024d825583893a047f9e6c1c44b
-
Filesize
806KB
MD514ec55240339c1239a400fbb9bc060a6
SHA1428982e064e12a4ebc3dbaab1f205aa17ab6b7c3
SHA2569755e30cf56ab363aa55a4b6a74896ab41011c448aaa6c8d658de97c231ff084
SHA51256074ff17160fb81aa6e6f0e408c4e91f4e9a8607b0d8a21248cc3b0b632a461f4e2ea4deaa1918cb29c114bb4008f10ce49e32c776a956771b77521bbbbc29c
-
Filesize
331KB
MD5a3e93460c26e27a69594dc44eb58e678
SHA1a615a8a12aa4e01c2197f4f0d78605a75979a048
SHA2563a81cefbc928fe136056257b8b57733164f2d1fa9d944dc02897b31b171335c6
SHA51239d17b7190f3ff5b3bc3170c8e21d7bba5c32c0f55bd372af2e848ff1ef1392083218a562f3361fdc2db95e4133a19c4ec1cab3e982174d76b8276358dac6530