Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 03:02
Behavioral task
behavioral1
Sample
5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe
-
Size
216KB
-
MD5
5520d3670d79e9c22c94cd373c188174
-
SHA1
9e23eb1380cf3baebfca4e8527569985047d42e7
-
SHA256
1adccdcf97e97d55129e7175525e59d8c8e38036c9f06bd33744895633d31ff4
-
SHA512
20f396030ed4f252f77b3d14f9967dd6cc8e392ceb474e59adc9d8251f5075e8a6ae7c303cfafbc6af04567fd41ea897718e55ba5a2e59f97b77db3c680f8548
-
SSDEEP
6144:7NCzLYXnXmUhko3w4ge971kk3YEJ9aghoSReu:7NCzLctvw4geda87JYghoSReu
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3000-0-0x0000000000400000-0x00000000005C4000-memory.dmp upx behavioral2/memory/3000-66-0x0000000000400000-0x00000000005C4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4260 msedge.exe 4260 msedge.exe 2352 msedge.exe 2352 msedge.exe 2040 identity_helper.exe 2040 identity_helper.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3000 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe 3000 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe 3000 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2352 3000 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe 88 PID 3000 wrote to memory of 2352 3000 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe 88 PID 2352 wrote to memory of 2976 2352 msedge.exe 89 PID 2352 wrote to memory of 2976 2352 msedge.exe 89 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 1144 2352 msedge.exe 90 PID 2352 wrote to memory of 4260 2352 msedge.exe 91 PID 2352 wrote to memory of 4260 2352 msedge.exe 91 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92 PID 2352 wrote to memory of 2288 2352 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.regnow.com/softsell/visitor.cgi?affiliate=36566&action=site&vendor=8783&ref=http://www.fenomen-games.com/_files/roobyrundemo.exe2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb260c46f8,0x7ffb260c4708,0x7ffb260c47183⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:83⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:13⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:13⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:13⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:13⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:13⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:13⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:83⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:13⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:13⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1764 /prefetch:13⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:13⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,6030453337052715398,10174728896085442691,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1960 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD543bb31bb7a5c8e543837f6c503d2a84e
SHA1522760d764cf8645160f6032cf9923fe4bb03c2b
SHA256002f4c622f55d4ef125e4e2870f014dcf1725146b70d2156f79c9afdd1396f04
SHA5121371361fd1d522b570e42731cbbd3bf6884d3bc04f80516100ff98847f87131d4dc298d4793188128db4e0c02272eaf4c86e22acb41c54d2b51390b85b2b6233
-
Filesize
6KB
MD5a1355119b00d295e726a1bda50caad80
SHA19dde52402a5ea945fa9878c0c47ce16b314bca1d
SHA2568404b81f9282a9f89b06a83dd2b2f4c004a890027068a026848247748c34d7d0
SHA5123a6843c378ccc38c5981517aa4f948e8c95ff23977124a6e3bbd2005f6c5caeb2b66ad70db13e1eb4ae41e1ef4cb978033dbb602be05303ab8309b735bd26596
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5a39c034c4ea7f67f84a9c4522603cf82
SHA1108bf0820378a3463f823a301bbf9650b5fb4160
SHA2561498e7276283192caeb0b971572af2061d48f57e38f42152504bd4325015e206
SHA5122b7495fee80954d713c5f70ffa71ccd82504df737c33adcea17211c4772d2f1471e1f5e52bc68b2a54b44ca9171c0907697d768e3b2f4869efe2eef382ef9ff7
-
Filesize
192B
MD5b32e479bd009ed83990c9673269a8679
SHA1c90602796792d73b8e14df593d28c88639957537
SHA2564da0710275fe2edc624ceae921dfed794450221c88daaac73467fc885cff1a3b
SHA512d29415020d7ddc493ac36ad2351414523f9804f3031a50c6bfded58d8b9a83f13877ae73571e9dcc50eedd7014230196313dfab8618e587e118ae6ba4d94db12
-
Filesize
1KB
MD551ccdd26d4775f4a5dbc38de2346e5bc
SHA17b4b3376f3326c982f1837dd0b0d20badb19a226
SHA25617497779fce5795bce061b4732245445806ac3053e3867caeb25e43e59d810cb
SHA512514c508de6ce89b41630910aa641247755e06bb316aa3795483b6ec023fe7ac13453d7f3df9377cb09026b3bc6213a2ae3273db09a115f77f5ce52de93e01464