Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 14:05
Static task
static1
Behavioral task
behavioral1
Sample
5f7961d554f4332ec77df105c24e0109_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5f7961d554f4332ec77df105c24e0109_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5f7961d554f4332ec77df105c24e0109_JaffaCakes118.html
-
Size
108KB
-
MD5
5f7961d554f4332ec77df105c24e0109
-
SHA1
d72c23b07572fcbe03fca84d247ac81498753fa0
-
SHA256
41e016ac94769b6324485ea497354752b0b80cce8fe76126d18f247b2245ed8c
-
SHA512
8bda4b7090793f0c2d0079bad757d0c8f228cbd679863445d3a226fe0d43f4bba985195176f5fe84a5e9e716267129c736443d5bf389000036eb690cbe93a1ae
-
SSDEEP
1536:x5ajjDM3O6y9pdpBApekWrO6LyqVmaYoG5zO6+RgktCH454388aFPq:nazM+6ApBy6LAbHfs8aFi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 2012 msedge.exe 2012 msedge.exe 6140 identity_helper.exe 6140 identity_helper.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1652 2012 msedge.exe 84 PID 2012 wrote to memory of 1652 2012 msedge.exe 84 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1836 2012 msedge.exe 85 PID 2012 wrote to memory of 1344 2012 msedge.exe 86 PID 2012 wrote to memory of 1344 2012 msedge.exe 86 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87 PID 2012 wrote to memory of 872 2012 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5f7961d554f4332ec77df105c24e0109_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9603346f8,0x7ff960334708,0x7ff9603347182⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2580 /prefetch:82⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6960 /prefetch:82⤵PID:5968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1760 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6784 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6148 /prefetch:12⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9075369702204485641,4914253111606507328,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5484 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
16KB
MD5a2bd3417ac5f983be2cdb532f2b43bdf
SHA11c28cf558e46efeef28bd3da3929f86ef74d93fc
SHA2565c447199d4ec11398133056e58a598e88f21a7d89b68fa93dbb38e15558c5307
SHA5128dddd50178a3e14f4dd0e8ccc496d7680755eb9196d710cc959e37557738df76d5fbed6e5a11ef05d781d62dac7d343de9cb5ae0fafa77952a4d87f8a9ef8702
-
Filesize
20KB
MD5397383c90a2d930f866f405747e27466
SHA17bb6b5d6cee104c877dc5c3462f61232ffe5b360
SHA256a67db01d19e15d8fa76e5a075e336e195325d79d277a83aadb6a440acf887c47
SHA5124357eddc0581e3cd6209646540bf59756cb4035d7dba47d5cb6b0050e6c202bda65721d4e9d644f37e3cd105bc5fa240574cfa96649f01e2769b796b523e08aa
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD581d19b898a5f63cae3efb4c8e9dafa47
SHA10cfa98553cd98b5b129f1e8c7f145482137d3962
SHA2568aee32bc9204deef0597bfd058a530881ea1d31bef8472ce638f96426e57c970
SHA512250019c042e25c66b336f8da18552bc3b73dff7fb34b234e5549afbd05761a93e94c1bc7f2da4486222c910d650309a2587f50b523694687c2772e414c290be0
-
Filesize
2KB
MD5cae7e3eb4d20ada766dda7963249cb60
SHA15ea5b987702478c48b4ed57fefc41e0a99253b75
SHA2563c51284c19e0637a77ef1c046c43504d6663a70213f2dd42d0b3d3f8bcb658e7
SHA512947c8c77bb83231bd22809d39214ddcdedec946ba7516caf03483cfd1b4276c721867fbc884bf967a860c653af70882bebe6d4318e789c2c20f2c18cfce69a42
-
Filesize
2KB
MD561064e37d44a3655be8ab06589a1778a
SHA1e908971e10027b0907603c6d5072c14144a8c7a8
SHA256ea129c620bd227794b72feb78abdcf8b6ef73fb19b522fa3af854df3a0c7ec6a
SHA512879b12f211a337c4588d2327a19b976f7f3339d1a026ed571bfbd0231091233fc6bd5cafac68dee450113ab6c8386908cba938ffb378be0a1d819e89fc37311f
-
Filesize
5KB
MD5dcb07122567f15210833b0531899bca2
SHA126a941401e1e0cfa45782c0124cd634cfe4b33e1
SHA256764fdcd0e1a21f41f43ed95572d42608b499883773acc2ef8188a1ca433d4768
SHA5120a3acc51226046aed19e7efd8f8331cd1c9e19423f2c6f138e8305fe92bc369ab7f58cb8999a9470790aa3de6a6c47101b4b69c328dda79ce6811e008eafdee4
-
Filesize
8KB
MD55010c38359060cfb67b476f66f123bc3
SHA1ae2f3a0873f9b86ceafab05b13e1b6c3940ca759
SHA2565cdac5063d7689f49a9bdc04e8bb0e570db03f4a42e6ab948631822c3fecdd42
SHA5123fe4e9fe5bf03689c7dc6dd8b79d019512c29413558b5af673223a91c7a3ff4905e1ff65671dae13168fa716a84f9b3381942f41249e72a51cf93aba7b2f23e5
-
Filesize
7KB
MD54046fd39c2edf751d8582bb85c6ad7a7
SHA1bfeb5816e0bef7bce16aaafd9cccbccccbe61acf
SHA256e2783e0e597a07c0352c9dd74ca5504d5dcc06744c994d5d402552081c4d5620
SHA512486d35f70b3634decaee7a41b83c0c237b6d742876d64943c82459bfd2537b5d45a75c5b51b9a0d03694b6b044159882d1fb18da5457cd5f53ee3daa73b26526
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD535bd42362f901ae0b582ab16c9296367
SHA1fb761e539b77604f3644a75db44c65f9d0572cbc
SHA256ed8cf4f1a3dbe68729e840dfc64ef7c20a0c8099d9572b5ac928ed90437c1b1d
SHA5120e767e375c19f1d421d919aa3af0b1f51bf81a80156137c707cdfd8216be2f58a716dcf09159bd81bb2ed6bdb1142569da5ec88f316616175288b20c990fe59b