Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
3dce2786b1a16d992400f472db02c045_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3dce2786b1a16d992400f472db02c045_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3dce2786b1a16d992400f472db02c045_JaffaCakes118.html
-
Size
25KB
-
MD5
3dce2786b1a16d992400f472db02c045
-
SHA1
fe56e4e818a2055f0f60faf5669493aa3c4683e2
-
SHA256
04fc1f8ef1de2adbf98effc69d2d9d09cd592d689d1ca0b4e2f9b8c8892f1046
-
SHA512
9cf0f6c2a14b96b06fd52213026608447d213feb71b35082735fa13d1c8564c92b8839e51210b0965cb638abea1c353e6de1d828f6371dec939383e7a62a3c7c
-
SSDEEP
768:1YVjkNA7bdfceD8LDZXzQffCXGX2p+92BX:1IJceD8HZX8fGGo+92N
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3558294865-3673844354-2255444939-1000\{46CB84CB-F6A1-4405-9F5D-1392D6F28B40} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2476 msedge.exe 2476 msedge.exe 3012 msedge.exe 3012 msedge.exe 2148 msedge.exe 3708 msedge.exe 3708 msedge.exe 2284 identity_helper.exe 2284 identity_helper.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3148 3012 msedge.exe 82 PID 3012 wrote to memory of 3148 3012 msedge.exe 82 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 1132 3012 msedge.exe 83 PID 3012 wrote to memory of 2476 3012 msedge.exe 84 PID 3012 wrote to memory of 2476 3012 msedge.exe 84 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85 PID 3012 wrote to memory of 2728 3012 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3dce2786b1a16d992400f472db02c045_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0b4b46f8,0x7ffb0b4b4708,0x7ffb0b4b47182⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=4180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5012 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2848 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6732 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6920 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1932 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,4042506850092251232,11125917910318713326,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
840B
MD599f2807f6e198624b8b1416f8d041df0
SHA11a8a8b1654ad2cf6170fd43c9236a777104ea92f
SHA256f7c6e19029f50359f92a99854f6c4b45f8bf78e38caee6a2099294557866666f
SHA5126230334a73d1ac04ebd31c4c7429a53ee148be994d663bd239a91a5715de451d919718b4337156377c46dedcbd8b2564cd489c1182943a12e4459ecd47ed2220
-
Filesize
6KB
MD582d54f4c310f52f2d496d87d3c3cfb78
SHA188b167eac04e675087b5b96c4dd13d9d06f08fa9
SHA2560a40a64f493c37268e13bbede0e5873d2b2493ff5023a5e3b8c80f563052aa38
SHA51236e7ae6d3f53305ee0e6d389f97c31c5131c0570d8513a7d6bea7bea601a1ac638e31b0080e276eb8f17e0ab3efdaeeabc3fbff5ec83c83feae403bdc5dce4c5
-
Filesize
7KB
MD5f4375a157b8ecfb64aa9589d5df046b3
SHA16deecc31107f6d760e19b1ca09ecba4b4c9144e9
SHA256a87bb7f8e6392f11480e0a96752d1e311cbeca1127cbb2bce43e2b22fde721d4
SHA5120bd929065ff91b23e102d4d9782e3c9477e0aca83bb54a07c08daedf5c22911f29710a1addfc0bc7559d6d35bd87a0c5e275ca395b62556e5156719868553243
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD552067576ba57d9b1b15441465068eee8
SHA108f8171b7d5c437d6c32d4de82be023457f21d62
SHA256c6bb0f15d18de3cf971c0b0760e30ffb24ad8c31b6081a819105a8ef0be40e7e
SHA512275ecfe423640e5996d96874a8ee6fcef1da3eee571b3ae2d15e11fb7915e6facf9f75a2b956762d0ee89d0dd0742817a0c5da22d96cd1c9c6f1951560ffb644