Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:45
Static task
static1
Behavioral task
behavioral1
Sample
6403138bb306082a8df20d35421e18f1_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6403138bb306082a8df20d35421e18f1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6403138bb306082a8df20d35421e18f1_JaffaCakes118.html
-
Size
57KB
-
MD5
6403138bb306082a8df20d35421e18f1
-
SHA1
2b32aa2aecb8f17a06543ad852d8dcd96254f827
-
SHA256
0b22ce1f1f5ac8e39d3da3ba4bb6345f2a9ca4bee562bb3cabf0d5fd4531c9be
-
SHA512
5da1af38cb2d7ff584bcf40235b21ecc6e39d0d3c858058da6636e4394eeac603617a39a6871abe58347b702350eca3b9c902d8b6edd93d6fbbf8a2a842a9310
-
SSDEEP
768:vHT0EipBpsA2UhV56KjkTxKucOndmxf0ovACNa+Tggdr2SX1UX:/TupBpsAl6KjkTxLcOdmxfh93di
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1652 msedge.exe 1652 msedge.exe 1284 msedge.exe 1284 msedge.exe 796 identity_helper.exe 796 identity_helper.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1284 wrote to memory of 3592 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 3592 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 4336 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1652 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1652 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe PID 1284 wrote to memory of 1388 1284 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6403138bb306082a8df20d35421e18f1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffee1a946f8,0x7ffee1a94708,0x7ffee1a947182⤵PID:3592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4336
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:1388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1812
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:4300
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:784
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7064 /prefetch:82⤵PID:1732
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2740 /prefetch:12⤵PID:3360
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:1516
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6840 /prefetch:12⤵PID:2012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:4456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1821195371629425872,8181934565683183245,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD538dc80db339dfb418e07f301625c6659
SHA16f372bf1e7eafda256213986cf677c65c93bea1d
SHA256f92be241d32827ce7638430e00ccfde8e649a7ea3f41048a9c52e495f85255ee
SHA512efe90601044793f8d20e217d8a4714be4042ecfa971b54216a688afdce2481c84a175a0b328fcd25d2fe4e7b06c3be8396c4f694fae07d3d7329443480888b5d
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD501437b94ddfc48abd855e457d47b9bf0
SHA158c1bd414ee688943a70e494313bde9745cc4c6e
SHA256db9718525224e3131704e47cb0498f613d01bed05b52298f4764023d2729d887
SHA5125cbe2654c6ad3f6cd374a0b421e37102e68ed68fef2a538b599db44c60e1008d6bac345448133db447cfe2ccfae03480bba90098f343b012e10a05d5a57146fa
-
Filesize
2KB
MD5ba1aa3b687aa57f470e8f48c20045ae8
SHA1c080de1d49d2dce784ed45baad8e4be6c7335ad0
SHA256de26d1982b4b9e3101c75b33e8d69b336d64986003e505aab0b1ce7195642a8e
SHA512694bb6a382416d994438a65b49af06d4f92359ff6d0ea1530cc9f345a53276512fa07249c749b1a13b69b1c8bdf24199868409fd68d6ad172480acfc162a9235
-
Filesize
2KB
MD5d31f8dc32aebf3af69cea421b3b12be8
SHA184d897752f31ef6bdad41d52270f8313bb4d2687
SHA2565e71463400447d3aa03132b77200550143e92c95191753c01a74abc139f95201
SHA5128519a0e4aceb07b5d1ac9a65453cc1bc2f5e77845de628e48a828bd6fe05d5fc7dad7ac503bd4ba6466539191e0ac15455401c99dbca7996081f5cbd8c4bbe81
-
Filesize
5KB
MD5db6c9d4437312b36d7f6e2ce2eadd60c
SHA12877733ba511bcb70cd2ce55ea2ae36d1784456f
SHA256793502624f195e3fb7a1ff79b7442e6721b39fa3969c22b57339badd772d4d1a
SHA51286810719a94058e9e2f05bd9075e8b7523ae7284ce0f3ca13fe0eb2be17aa602025b60f88ca2ae8747bee15ce580ee11a3f060ec4e6aadcb8f38d419e84854ec
-
Filesize
7KB
MD5f82e09cbf1bf30a720a7332094cd896c
SHA171702d2db89546fa3adfe64462723ded9e1ba4a7
SHA2564bce3b89da12254b3f6a20b492b492a8dc144ebaa37681d260bd113b5067a434
SHA5125b0dd03919b2e769651a4b33b4465b2bbb3bf71a6e7268482ae25354c14b60e7f8b28f04341dd540fe49f8d2593e44cd56e52fedd8a29d34ae13dde9ff0d2c7e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5525ea4476b2a447bf448f9882e1a382b
SHA19210e83cf36cff25d9756a3844be183cf0b93424
SHA256a0683d8104a35c4e42cf9cb68e3b72aec9d84ec92d244aaedb01f686fb2e68c0
SHA512e31e6fd718a500aba176693c56d1a74d19899c9300feffe5bf9e2c791a4ea0f3256d0ab0c6c584ebcf0f4dfc0d3fcf1e17dc7f5844219d0ca420ecc043cf5cbc
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e