Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:10
Static task
static1
Behavioral task
behavioral1
Sample
63e90d913342d2c8d8c2eddbc0beff97_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63e90d913342d2c8d8c2eddbc0beff97_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63e90d913342d2c8d8c2eddbc0beff97_JaffaCakes118.html
-
Size
204KB
-
MD5
63e90d913342d2c8d8c2eddbc0beff97
-
SHA1
0811597b94a45d6b9c7252900eb024349ecd948e
-
SHA256
b486e726281efcf402bb974c1df16f5df2e0a3f51b187c87dda7995f8baf204f
-
SHA512
c7e11f1a4ac8f6970b7f0fd8b50735600c88de1cf50a93ce70ca350d050744836b5752f2b3fa25dfb950d80dd1e291b7ed91a942ce9ccff8d2b9355cc0787b6c
-
SSDEEP
1536:ZnHH2N9XZcgGHnAkYrRk7qnpcmoyAkYZAkYkAkYFAkYcFUPnG8IVhnVd4wa0thFb:5HWnp+A6mnJoh+HigFUPghD4wa0thFb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2948 msedge.exe 2948 msedge.exe 4304 msedge.exe 4304 msedge.exe 228 identity_helper.exe 228 identity_helper.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4304 wrote to memory of 2564 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2564 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2992 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2948 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 2948 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe PID 4304 wrote to memory of 3804 4304 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63e90d913342d2c8d8c2eddbc0beff97_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff467446f8,0x7fff46744708,0x7fff467447182⤵PID:2564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:3804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:3428
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:4248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4280
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6836 /prefetch:82⤵PID:1204
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:12⤵PID:1132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6308 /prefetch:12⤵PID:4116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:12⤵PID:5000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1976 /prefetch:12⤵PID:1592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,1750654301708850076,3474079997587269823,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5468 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\15af6abb-2b6f-41f9-b6e4-c3e069a8577d.tmp
Filesize6KB
MD527968562c6af4d577a8149889c3ba13e
SHA155c632b9f4dcb73030d6aa506e5dd5b4b884a0c7
SHA25622bd8cf9b5f57b6449a8071188f811b4fd52581ab21e9c803a236b063d7e1510
SHA512557c188acd0699f9983bf4e07e9b307ecb94729c2b3341d9e17bb744def709ce674fb911098430d241bb5e970ecd405a1d0ac7afe0817f31824259d45bcc70f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD55fd91c7e07d4d0ad1a3fefad8c5280c6
SHA1f66cf6f78a0f746324875d8c872dc395cdbb4e5a
SHA2567fe2ebe50fb7d6fb7cbad47eaf609167970bd98228745353f977819ba74eaab0
SHA5125d877a141cb4dd9cee2ab17c8b04403665b4a1c392ba4b1b1b2b7923983ab62dec88f58ef276245ebf9b4b7d84c68d669530c28b9bcaccacdba1e5083e9a794d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5472977acd7ac8b4cfe84d3c02593b62d
SHA1c1070dae82146e0bf48ebd2854efaadee9327ab3
SHA2560a28802f254177cbfb143c0ed3cb0d644b0a4df55e1be7186ac6e4ca321f9368
SHA5121e414d620f0cc365f521ed6c503b0a3ee727d277bcea30da91abb364c34d358e3186a3c15355bacddbae2707a623cdf4ea4c15a6dd54874960ae8b938326ea31
-
Filesize
1KB
MD59e652c61e39afc51b5e76cf45771cf92
SHA1b813dbbfe75b075128c740e5621189089331ef71
SHA25614a21de9bb3d8effd094621fe51d08c3af8460a8629b63b724e422307f7e4aca
SHA512c479f87b38556310e20e46f9c208df7479cf7b2dc83c21ea3513986153c5f87c0a2ceb76266a6d5024cd6a1104f5316ee8739973f36cff4c7fcf720cbc3d53ed
-
Filesize
1KB
MD5ce04cd316c09754652ff646bb148a22a
SHA1b164c1a2daf3767b219595ca654bb8f46e599f3d
SHA256723ea73184f6047fb781d3880cd7411f5cc31c0211d5d41da05833164bd5fe50
SHA512be4a7b67c22b5a84de0b4ddd7de8710a0a9adddfb878e87ea81d010394863c2038ac8362f05fb8f4da6e683cadb4c380501c22a2fb1b0386a35ad00f72222c20
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD53fdf524ff7adc1074c4a86b752d2b2d3
SHA1bd32b28b056e60d0cfb2b6e1430d89fba9366fb3
SHA256beef261f070ca2abd9ef0ca517df3b4277d64dd50d0ca9db60476d5f226517d4
SHA512b6e239fc9d82d075c31f26451c157fcfc9eff5a30f38f2f6e3aee7d82f90e36824ba88d891085d558b4070e0c10206264ed3d0502bd3ae5d56395c7fc1b0fc05
-
Filesize
5KB
MD55b0d8499bff7f16d47cbe183f158940c
SHA11fc84726d7b771cb4e97041bfe4f6b14a2dccee4
SHA2566372d358a18d588f95f39dc2bc1c535c4265771e56e329a3bada33a3870c9fa1
SHA512a35dd9ca69db07a8212db59cc132c8ea063996430c1e9148cfd4c4fddb700e372f33cb02441eb46b1465f0fd2e003b3cb5727486380b24604ac45d432f5c14b2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5352de4425a2e9e4e681b8385e5c304a9
SHA1b4326434236aff368ed4e77cceff51f760fbaf9e
SHA2562ab56f9342528dca9225415b3308dfac7a727a7a148094e074c5011a5f85ea9a
SHA512af1c1d162162961391129333363b5f0f688be0855a460b7711baf1825070838eae8d9404e3d6cb803cc38971f06c1f0b33e801ee8a03ee10dd4172a2050e1d9f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e