Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
394828d410fa81244f935ea9a17eddcc_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
394828d410fa81244f935ea9a17eddcc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
394828d410fa81244f935ea9a17eddcc_JaffaCakes118.html
-
Size
175KB
-
MD5
394828d410fa81244f935ea9a17eddcc
-
SHA1
7b6b5723d9c6ee690f2587235e5148ba0f4f8038
-
SHA256
adb2e65450bf47552343b154a92cc05cb72e4797ca94d965ca256aa4e643b394
-
SHA512
6d818a3c77bf3c4bf8f3c46f40debb856b039f5fb84a0f9ddd4213be8e9f2f42fec68f467ce78a0658b78304b16d8519518312ae47c97685a1542833bd70b1ae
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS30GNkFGYfBCJis1+aeTH+WK/Lf1/hmnVSV:SOoT30/FPBCJiFm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 1580 msedge.exe 1580 msedge.exe 3684 identity_helper.exe 3684 identity_helper.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1580 wrote to memory of 3424 1580 msedge.exe 83 PID 1580 wrote to memory of 3424 1580 msedge.exe 83 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 880 1580 msedge.exe 85 PID 1580 wrote to memory of 3436 1580 msedge.exe 86 PID 1580 wrote to memory of 3436 1580 msedge.exe 86 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87 PID 1580 wrote to memory of 2408 1580 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\394828d410fa81244f935ea9a17eddcc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f44046f8,0x7ff8f4404708,0x7ff8f44047182⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:82⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,12592324991668107775,9501702180767082592,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1292
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
19KB
MD5750ac1afc9ee7dd557768978d15fba50
SHA1133e9d996f8168881eb07ba83a018f738f5c35d8
SHA256e1210625fe8a5279775627c004cc39fa045940ed57229f39d3d472c53d306fa0
SHA5121b1dec12c116459a70bc7dcd657aee3c1616e75c26cb02db4775177cc2a76d616e3156c3c12914b8fa826b9009e2715a7a1215c8ba317737d01129418717ae50
-
Filesize
46KB
MD5ac83857f0497a4a0e7669329827cf228
SHA118ea483c966969e43a654fcadea9719a8aca370c
SHA25643337a1354f376890cdb73f3dbaf95a8027761c574c30cdecb321096be485d3e
SHA5126a35c50764d31d4bac07ddbec2329238cd04f2c58c00629e523ae7fc2a7d6be5d1226f8fb6c3c1043b215c38c47951a66fa8a9d4f4d6ddce7664bd1d011db2aa
-
Filesize
95KB
MD53dfe21a99e36122cd7546f3715bea195
SHA1cf14a670e3173a6a2228c2a18f814500ab40fc8b
SHA25614fd31b8f71e6608c396c2016fc1679e154c31e83321cd66d4240bac07a7afdb
SHA5128ff358eace7ff2b9561998755e47a8e85321fdf560788daa14ea0305183e8d6b999639775de37b1fa631c74ef05d9ce553c99190192ff1b5bc229d1c70ad2e79
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5a6c0a32ccd5371af90834bedbc5c2f01
SHA1e3dec77674b43303a13da742c7c332464a1b164e
SHA25611955d292afb395c50718e97494acba408cc51b10afe4129f7401454dcdaeae5
SHA512ad9dc982ed628ce9f74da6269afd927100bb45154eb823d13171909d0f5050455f0e01feef9dde3c8a616c04e48c4813380946f04c1c7129e34b61a5d6708f06
-
Filesize
2KB
MD55550eb9db304a7325dec9b96b3cad768
SHA146a50ca4b36bcfc709cf4a9903f7388630e1142f
SHA25698d6b34051496f3baaa1aa5275a56d33208625bae42185c52145a68f000f0d19
SHA5125745be0cf7db39da3b12c904f474a7bc861adc8e6415b5e8a4887b54fbdb8139a6688c17501af8614ef75080bebd4fafbcf9ce811e9e262f8da22de2a86ea732
-
Filesize
2KB
MD5a8cc486f1f96a38a5941f772f2c6b8a8
SHA1d60653f88e76e2ecd2991cf94061a5eaac4b83ba
SHA25690f8680570767668b68aa3eba268a78844347666836eda4437895021df3f9088
SHA512510f71a94befbb83de1cea6f441fbe0df24f1c7eeb7bd2f2b3a119f0921fd4e942221c440bf4770cd2189511c7017ebeec64344e9c92d1af3c4e7d9d242927b3
-
Filesize
7KB
MD57471b9e061053581185f8f41b9bd39a4
SHA11e753beef8feefdbaebf78b2532bd3d6bca6e0e9
SHA256de27822466b099cc141ce5b9f4131096c4aa46c9c627bb7cb069a1c38c6dc53a
SHA5125bbf69e67d4139bf2bb129665959c0ca661734f0c15caf25ad020dd87470d78894cf77a2cac3bf2b22684b6d8b6770f934d1b62c20568ccdbe538b0dc2ad99fe
-
Filesize
6KB
MD55b47ec3d94027284442dd008b5b6cd5c
SHA147eb9df24e28047e8cef61d9f183573f14b61dfc
SHA2564991aad44591510b56603e49c4620e892afad9816fb21314b1cae75980491449
SHA5122a963278be26ebe082d0dec32557c616e7af4222d1559742aea56498e31ebbd11acb0cbff947ac4b804babd9846937d5a5b7573afc0257ba43d2815b7030e4b9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD59687f809bc0f5548bf6030dba5d0ff2e
SHA128692ce76198024edbfb5ab91ca8ed8de64815a1
SHA2565f522bd4274af4b8aabc1f29461579b9e06580f5443f97dd4089b739c82d4cf8
SHA512a6714386097303ef1d304872c32be6ef9247ee0fad86515d9b4a50ebf01940b77b2b246d69932e6917d9a00b21038ccc739eef6d0af3c066e61f0ee4d32c4ab2