Resubmissions
20-12-2024 21:57
241220-1vd23svrbr 818-12-2024 19:52
241218-ylw57azrfn 1018-12-2024 19:51
241218-ylabeszrek 318-12-2024 19:31
241218-x8fw2sypez 818-12-2024 19:27
241218-x6k3zsypaw 318-12-2024 19:27
241218-x54hyazlfn 3Analysis
-
max time kernel
47s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 19:27
Behavioral task
behavioral1
Sample
fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118.pdf
-
Size
93KB
-
MD5
fcd1cdfe358c3b7c95e10cf72dbf727f
-
SHA1
7c5c487471db6b1702085fd880a931a819baa264
-
SHA256
d95ae7b09fc599fa5ef99c04131117f9b8f9432b3b4aa9cf8492535f8d71ceae
-
SHA512
30ca7a429aa4b1b3a877c6b8b83e3f957c2cb5a7a06d2ad63e0be5e85ade27f0d3255d8c0c671150013c01546369052882f5db77997f3980148a8b7a3a47caa6
-
SSDEEP
1536:UHedaEV1N3QjlwBgiZDASIKwJJYut9OLod6/d3Vb4fcXwWx+7oRW8pO+W/O:Kedai/3ywBgirIBL1qd3VbrXp+7ow+D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1224 chrome.exe 1224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2692 AcroRd32.exe 2692 AcroRd32.exe 2692 AcroRd32.exe 2692 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2624 1224 chrome.exe 31 PID 1224 wrote to memory of 2624 1224 chrome.exe 31 PID 1224 wrote to memory of 2624 1224 chrome.exe 31 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 3004 1224 chrome.exe 33 PID 1224 wrote to memory of 2488 1224 chrome.exe 34 PID 1224 wrote to memory of 2488 1224 chrome.exe 34 PID 1224 wrote to memory of 2488 1224 chrome.exe 34 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35 PID 1224 wrote to memory of 2644 1224 chrome.exe 35
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2692
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7fb9758,0x7fef7fb9768,0x7fef7fb97782⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1288,i,16060410008472118681,5996338033591432797,131072 /prefetch:22⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1288,i,16060410008472118681,5996338033591432797,131072 /prefetch:82⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1288,i,16060410008472118681,5996338033591432797,131072 /prefetch:82⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2252 --field-trial-handle=1288,i,16060410008472118681,5996338033591432797,131072 /prefetch:12⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2260 --field-trial-handle=1288,i,16060410008472118681,5996338033591432797,131072 /prefetch:12⤵PID:292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1384 --field-trial-handle=1288,i,16060410008472118681,5996338033591432797,131072 /prefetch:22⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1424 --field-trial-handle=1288,i,16060410008472118681,5996338033591432797,131072 /prefetch:12⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3632 --field-trial-handle=1288,i,16060410008472118681,5996338033591432797,131072 /prefetch:82⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3652 --field-trial-handle=1288,i,16060410008472118681,5996338033591432797,131072 /prefetch:12⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=576 --field-trial-handle=1288,i,16060410008472118681,5996338033591432797,131072 /prefetch:12⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1792 --field-trial-handle=1288,i,16060410008472118681,5996338033591432797,131072 /prefetch:12⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3968 --field-trial-handle=1288,i,16060410008472118681,5996338033591432797,131072 /prefetch:12⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
41KB
MD5ca9e4686e278b752e1dec522d6830b1f
SHA11129a37b84ee4708492f51323c90804bb0dfed64
SHA256b36086821f07e11041fc44b05d2cafe3fb756633e72b07da453c28bd4735ed26
SHA512600e5d6e1df68423976b1dcfa99e56cb8b8f5cd008d52482fefb086546256a9822025d75f5b286996b19ee1c7cd254f476abf4de0cf8c6205d9f7d5e49b80671
-
Filesize
280B
MD5cc5ad55e67ee9a90aa65d4f06afa8a08
SHA108017ea3e49db910afa2011117b7c437c4aaa1b5
SHA25670f38e0563dcf7abb3400e4cc34b8dea037219eac4b41a66964ec1af51119129
SHA51201e7dbeea48c70e2c8251763c61d1422a8b6e2758b48cc95c22b01723079b10ab0fc582d4d9fde3ea91c1ef1dbb676f3e4c08d030df41e1b741a90feae535151
-
Filesize
19KB
MD5dc6f4ad53c40266c71ad76e719ff3781
SHA133e511fa6089079bb8d032e3f55366b1f403e609
SHA2569dc06d43184859318a5af7cf6b6b86270b6e2d980b48cb4754f5e8c308dc34ef
SHA5129d75e3c854b70dac356e096ce9964eb826b78c3aa51ef19566f245ec47249d003b46316823ec3823ced59b427c7f17c5ca6a7763156287c3c935de915f07e731
-
Filesize
168B
MD5a01b82c45dee532f72fbb0ad7972b1d5
SHA1fa52cb8da0dff26b65f92be135ca48dc8567637f
SHA2560a67ebc86140217c4ad47bd8d93d8c5c82396a833b6ff165b9ac63cc9c120954
SHA512b5ff12b0aed8f87e0ace1514a35c91a535a5490a4b93c82387803ec6d5ea5d4ccdf85b6c1a63f8be2946bec1b45deaa988a5a938b2a22c62771a0da5b606f74a
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5d8a333de97564d0dcb5a5834813df5ee
SHA1d4eaf1ba3afa7a38a0f9a4d8e1e71e17f283375a
SHA256094e57bb60b9bc759d62617a65673b9bb5d648fbde9882b00befecceaef55acc
SHA5124a961621a6700a12acb5074868593e89955ffc01e2c30090faeb7b3911dc9a4b154f1b7022223c91a1deed9250811d1c20be50f9b8868b7efd499218a2e3aa80
-
Filesize
363B
MD5db053616764c833dadd77e1a985fdb59
SHA1ff487bd9e518db9f95e3823b611e9b4c03bae9e8
SHA256304adb09a5eb0ba860c16236ed359dcfd40c139e74b484f80531fa9af1590181
SHA5121c932ec7e2a022ead7449433883f9bc9e3bcc5abd447dde0bf1bec8c5ec726b9a6032d8bb3062e74adfeee117617eb60fac8f5ff2bb3afe31105084703e5b553
-
Filesize
361B
MD5555c802cbfd0519b3ff0533e273f3476
SHA145e65b92d342c2062acdde2e8bf442c4a27c7a7c
SHA256beda77cf5c8b72787dcfe837c9527d0d46211209b7b62c82a13a23da0c61d797
SHA512df4945a79304dabdcacd57ac551f2e6be5fd30bba422a648acf18886198768491e1c2f411e016d68dc8be2764513198ef47a6dad08e3777d36cd756e96524f6f
-
Filesize
363B
MD529f89068eb1d796416f096f5bbb4e25c
SHA16c49a6f40a1d9794a17d74f5ccebf791cdc8d87b
SHA256460c4ef46e7bc55c7c5a8ddf52eb37f4cd360c25a29cb58ffcf8055069dc78fc
SHA5129e64c179bcd6135c149650062da296fde411d3bf4fd57f44d2ae5d0ad4d4d2387d5f4f31fc49e12956d4b8cdf4edd0b6d1f9cfa59a3e07f8f0c5715a7edbfc5e
-
Filesize
6KB
MD5ec953bbd35440abb1495723eed1888bf
SHA13913d4e1f2472f2e0002787b6e7a55fbf0e86ed0
SHA2562e69efdd89fd3b6b9c14770c0c9aab4df5d5548ade7bf8578e4a90b80d92d970
SHA512620114edad7ceb01de2e6c64784e3c9e5a9f99a3fdb0295fa556aed3ce661e1d0b20bf989d049d031b32d5e12d27175208557751f84b4457649a878deddb4fed
-
Filesize
5KB
MD5d752a4aba83e7b53e52fe0b56e3ff32e
SHA18dd867e208721c44b81413de19d0571cc481f43c
SHA2566378bcd8b2b3bd7277d8a6bd604a9cc11c7eef0c78a593185c9b1d2a68f6e707
SHA51231d2ffea354bd19a6749756a4658042c32d3f97420e2098dbd276585f742f7d652fe7c003700ec26dc6c3b9609b071fd87bfeaa2836b2f306dffee2e48a6c4f6
-
Filesize
6KB
MD5f60fcde1d25357aa7128d87e543b9ea5
SHA16e5dddd0b377aa57beff13229fa949a6248174a9
SHA2569e7861cd6dd791a3f1c288bcff3f1d5ee41b3cdc6a2e868e3d4c46a36e214a5c
SHA5126c7f943cdd2b99872213c197161541625efcbfb0ddaf09721368f4f5cd55e7d4fc64ad8c377f5263c6568710a86fbb00d9775be9964b5cdf0cb8907048d18152
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
3KB
MD552d209eb6b5246e8e32a5b33c0899f93
SHA1d12496c2f0ec3d0c6cdd8014d510ee457f3c8160
SHA256b6f77ca4c276d497c61e3451ea78d71ae1d8bcd115bad4830c4bb9870d9174f4
SHA5128aff255e477730332fd370338b0b9b14b65b3ee1021d2248ffd8ed0b9ce52716dfbacecb7c533d019d2509c405397f66a2aa4549654e0f60d8114fbd9ebd2dd0