Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
657cb3d5bd7f2461af1db793ae1f06bb_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
657cb3d5bd7f2461af1db793ae1f06bb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
657cb3d5bd7f2461af1db793ae1f06bb_JaffaCakes118.html
-
Size
55KB
-
MD5
657cb3d5bd7f2461af1db793ae1f06bb
-
SHA1
0378b99f40b2356e3c0d235da209dd829471c979
-
SHA256
4e6f89a64078ac083a9473703193b31c28b9af06e5d9a3bddbe5f1899e7f6440
-
SHA512
bd60edfb9d07f25465f3e78e1ae32028d4fbf09f54d9517ab546bdf703defebe768bdb492f400ac659bdce39f45a93b9e23c47b81b3cc1b683bf46977b64c1f2
-
SSDEEP
768:jZ66oa+gpaEWlyHdfqlIr7fJ213vkOSTeG+yKIDh0xDx6NGp29y0uV:166oaZsyHhfE6TyryK6yEGbV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3256 msedge.exe 3256 msedge.exe 2372 msedge.exe 2372 msedge.exe 2560 identity_helper.exe 2560 identity_helper.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2372 wrote to memory of 3640 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 3640 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 1488 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 3256 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 3256 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe PID 2372 wrote to memory of 4496 2372 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\657cb3d5bd7f2461af1db793ae1f06bb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf08346f8,0x7ffaf0834708,0x7ffaf08347182⤵PID:3640
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:4496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2348
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4784
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:2196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6676 /prefetch:12⤵PID:3508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6696 /prefetch:12⤵PID:2504
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6976 /prefetch:82⤵PID:3512
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:5240
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:5248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,14121406654127041461,14434452967175760168,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4572 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD515abca8eaf3b63f077fef21741ec38f5
SHA1086ecb18ba3c6bb4e537d5f428074e7691649cea
SHA256f3bcb485e88f3cafc12dc40dc43a42078283eedef803e7e0421388ad9e2db119
SHA51288aa192f249cf1161439367b321a21b817dd07fddd92cba8630dd1be05b05d060a067630cb7687d5bf85a4faf9853f6dc2a903663817d47936b9063a7f30a84a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5e7046e1c53a0a1f694b3d7bfd7fe5d99
SHA1cfb3cc1f8106cd98d7ca5b3aa7b39fae44284386
SHA256c9d4d4077c3ad2f43adf60b110f35cb3f3849270bed7fac5c5efa7a932728e46
SHA512b50cde70f5656c5329e8310336b65aac828b33a739b4425b8365f35f23a838167b76f884ad827045470b8b8d91a5575447e93b665104cf2d7288575eb1edd991
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD550a67689ad0898a88624b24e3268bcdf
SHA1aa8b3c21326917eca5613a1051ca0fc22f8a3d1e
SHA25635f5a45d0e33568b02e439c72e97e0ab790eb7d665136c83d57021f2499893c8
SHA51263f78882ad72b897551a12fa85ecda4e895c70dc299e93909196d05ee45340f79768dfb934d8aa42f73ffeb4b271a29082799b3c54f074227408c845dda0882d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5cf81f1a039fa049b6ec791d25bab8475
SHA1fb78901a4fab2f4a43143408b0e48411e2e16ca7
SHA2561dc52fb46b2f58e9b9b02cb6d214130a15aa3069408387f5cb1c787a7cf3520b
SHA512b21bb3689bc03cb6dc588d5cb78469d9d8bbb1e12e4ba86ba5f7e6337e333a52d5b94bbc09252b50541a28aa515c63bf2e9a76fcb38c24383929ce4d42a49310
-
Filesize
2KB
MD53c737dd17105e6ad4cdf01a9d5798be5
SHA1c1b2883fd61ba129925b9b21e1f296300812ca01
SHA256fdecdbff190380c4a1f8f48c90062f9db2afa2455133daaaf4791cbc325b9994
SHA5123d4e495b3aeb34d203d8228004e4a354bd045b5331d50959f6f12744f0a959eecbce9b1638f04a1c68d03f78e527b3ecd95c90c152d0e54c6baffd71b153758c
-
Filesize
5KB
MD5b50305dc4aa6ba225d15dd089069a2dc
SHA16d011c0530476fb7ba86f55fc58cce8217136cfe
SHA256cd316ca291cf33f7b7a5b3c1fdc7e5f962d1934e839d94a569f4e3b6172536ac
SHA5123374b290fa83cc4dafabba2ff29903842bdc8e19cc1c4739403d92494be0be0a02b6a1777beb7c2384785465dbc6271f7008b3a87f1c061e3e2997d195a86023
-
Filesize
7KB
MD54c41e3584ec6f789f594003e08d35ea0
SHA1c246ff3ee4f32e10f19207b238a78fe10974e3b0
SHA256ce2c973ed1af45cf7d8c02f6906ac7a5c83a0395c5347fb6ebf84fbd97cc02eb
SHA512447eb211c7cb5948ca123cffdc6b5c94ef82e62bf9eb3aea7f116661d79e7c8daea9fbcd6043cc12c8b77a5ffbab633ed60677af6e3b5322490509f156f0915c
-
Filesize
7KB
MD54be28c67c1b078ac4f139dec04143862
SHA13be6aa45bfcfced4e67c838ae022fd44f2ede51b
SHA256b29d299dc70200e48d68b82d358618baa833209d4a73c32badcf4b5c0e0252fd
SHA512007946fb1991e0e12df2581ed7cd24556a70b7ac9f0086589a85626bd58b6cd1c4eb44096fb382214d38c26da93b6db4b35d1757a58d25b5c7d221f4cb5cd354
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD54d5c63584ae7b8fb11b405ffdaf40948
SHA131b77757c20cf1316ddb2dae3abe32093f0aa801
SHA25637d068cf94cbaea62b92342d193426d23a498624fa6dfd889e9d043b4c527275
SHA51292f09174c48a0ddfa07097f4d23059b57761d99cb94fc043e8fe065eeff43c02fecc9760cc508ca12aab8c312724de615b08f4b4737a61f755254bf79a927d5b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e