Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 15:02
Static task
static1
Behavioral task
behavioral1
Sample
2fb1fd0ea401bdd6a4655d32cab921e2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2fb1fd0ea401bdd6a4655d32cab921e2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2fb1fd0ea401bdd6a4655d32cab921e2_JaffaCakes118.html
-
Size
90KB
-
MD5
2fb1fd0ea401bdd6a4655d32cab921e2
-
SHA1
be7442763e93cdd45278fad2cd201e59791e87dd
-
SHA256
c291104a9e3446b0bcb300a4790da3dcfa3881ab0a047870bf82ae8c3083f96c
-
SHA512
c02af7b7aeba63c2e3ba57fc554ef53712ec91678cd2949e3a5d42a5711e71706f06f60c8da74a466b854292f30348dd71c8e441d042135a7a2ef4aa843a2e7d
-
SSDEEP
1536:LneXKc4KpB3juwb252bOqU2rl2x2Y22A2z32z2n242f2f2dy2g2s2920W232XE5b:Lnq4KpB3jaJw5ggW/1UO5R0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1832 msedge.exe 1832 msedge.exe 3364 msedge.exe 3364 msedge.exe 2060 identity_helper.exe 2060 identity_helper.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3364 wrote to memory of 760 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 760 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 2652 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 1832 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 1832 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe PID 3364 wrote to memory of 32 3364 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2fb1fd0ea401bdd6a4655d32cab921e2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7c1346f8,0x7ffa7c134708,0x7ffa7c1347182⤵PID:760
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:32
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3368
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:5092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:1172
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:3708
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1736 /prefetch:82⤵PID:3096
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:3948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:4280
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:2840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:1616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5665058015769246990,14602798612031385675,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5684 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6091f90f-4eea-4062-9700-0769a8824b4a.tmp
Filesize1KB
MD578c9b1a774ce733d669bb2ac55877904
SHA1dad9b90c854998a421ac25b2335c43d95195d7f3
SHA25671f66858a75cc153235d39c954cffb772ace6c69d13e93e065bda6926bcda143
SHA512b5818f49be85687a0939279e23698be36505a1ec6d27b6d647b503aeab5f339a295a430df0aa3912fdc12040143bc9c02592a66ddf07bd4ab6bd3a274ea67df1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6e68a874-a9c1-4ebb-9b7a-5595aaf9cb32.tmp
Filesize6KB
MD53c69d611ff06ee0b5dcc1f8686828c7e
SHA110b725b17f6993528b3aa224bb17a2022bed3efd
SHA2562f8c206d7b08d6d6edad7597304c2fccbe222c00d06a4077ac16d7c39ac692a8
SHA5123d355e7006f8dad1a3c4ebc8b8aad08e673275cceb6ec19131cb2da274478729f9089394be6fc078f0d2aa2ea3c8ec8b1ba4d44ca86fe0b1d034751543fa5d4a
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD58f2a11ae86074927448718f41e6fd893
SHA129e392fe4018637df2c9b098996afac677ff61d5
SHA2563192719b99b315d2d8b9663637dce11fec249df9ce5921ecc55717132cedff6d
SHA51268a02bab316ecc86c4b9f5b49b3ba9b39527fafac5ae697148ecf9e12277fc6d320878638e641d50cc30fdce685caa3ce0ab10df9d468a36cfabd60fb6728594
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5fc2c96dec1c3b7f233c2d32b40943eba
SHA19e1e73e80137e6f1168a8f81aac6d609e628a639
SHA2564ce71488193ff9800a51c0c69fc05e8c1c31ecad62c4fac1bb6abff7bc150e31
SHA5122a2175a8f61b0cf70e6bf94fb385f44a525977ddd15900a34143bac01f474d16b6ac5544be0fcf99a9519ad0c02329ff8ba7fb288a6f7bd6d447361320730289
-
Filesize
5KB
MD5949239f332fc0377a5a97ca4a52623f1
SHA107d435ddace56bf1d5da575bf923590dbd8a894b
SHA256e03d2115b721292a386672667281603519ac3c63eeb7d658ba10699fad33591a
SHA512c6040fc4dbd52299b0841aa35954c3b68b24a110c586a576dfa57f32165042135642b94cd3c1570759290626e0ab71aa92872f23b4ed0b028b76fd0803cde935
-
Filesize
7KB
MD54e39ff5d33cda6246dbb6e32e910e073
SHA1a2cd5bd1c57e445247f29095d4c95a7e89ddf71d
SHA2568c63eb5d3b89a6071922c0a212e203830f43106e2d2b674e59fbbb369b9f3ddb
SHA512526e2a1936499b273ea2f7444fa0d78a34adc2195bc7f61da952613253408954da67322985469b05cba3e2bf969b74862d410e1718247cf6978a63f9f9b730f5
-
Filesize
7KB
MD562aa0604ccc0f337c43e94bcd3f9eb40
SHA1bddf76aea306c47a7cd9914b7034fd6b4e3101b0
SHA256c5aa002964b632d34f084b2fdae0bf667e81fdd6eee57520b51434b0a517c44f
SHA5122dce04e97a9345ba4b3ac63164f13c20d957fb73238fe58c3831989301c7daac67938245da5393dafe691ec2fa444c28362a3bd97e9b5af188a54a1d6964ba17
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD56de3daf77715dd0dafdbfc6f752e255c
SHA1504ad31186335001045f6cf094748a6c984d1fb2
SHA256bf61d1fbcbcbd2b9ee35bdd284b0f4856cff95110312c326c3e8e301e489cfa5
SHA51210d526c6a8e583a4ee7d6ec160a37be90567d6020558ea90594ed12cae41e19dd22b81ba40297858ecce9ec6e1bb912d5858539a483e663c434dc73d79eb4db2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e