Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
943be18d11c0a71b89a486f5c37a67f3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
943be18d11c0a71b89a486f5c37a67f3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
943be18d11c0a71b89a486f5c37a67f3_JaffaCakes118.html
-
Size
74KB
-
MD5
943be18d11c0a71b89a486f5c37a67f3
-
SHA1
80516269f6436df2d7220df1f97f99c79cf62783
-
SHA256
7a42a75bc5d38616611c670c6e5125ed7a27a29065409934646f03972ea44dde
-
SHA512
de54b504a2de97d08a09d2ed429ddb0247ffb32fef8fdee126b84445e90dce616703a9d2baaf1f08fa6f42a78db5c6fa8fd2f4beb6bfceb6e4b42b3df04b50d1
-
SSDEEP
1536:gU6tmpAxXfVBBLCbMjVFrH2NhN2VZ/i5EF:nMXfVBBeAr6hN2VZ/L
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 768 msedge.exe 768 msedge.exe 2852 msedge.exe 2852 msedge.exe 4696 identity_helper.exe 4696 identity_helper.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 4980 2852 msedge.exe 81 PID 2852 wrote to memory of 4980 2852 msedge.exe 81 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 3188 2852 msedge.exe 82 PID 2852 wrote to memory of 768 2852 msedge.exe 83 PID 2852 wrote to memory of 768 2852 msedge.exe 83 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84 PID 2852 wrote to memory of 3308 2852 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\943be18d11c0a71b89a486f5c37a67f3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbb1b46f8,0x7ffbbb1b4708,0x7ffbbb1b47182⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2280 /prefetch:82⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1884 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1296 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2196228559927452414,13555339349286191324,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3400
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4e0 0x4ec1⤵PID:3100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5ffa1cb12f15454ba7c712d6001d17a13
SHA194977e7a04abbbebdd639af7555bb721eaef9348
SHA2563288dace6f96bc8829da34f2892afea0ede344a1e962dbccd6866640326ca33d
SHA512e53d0b3be847f5ea5633bf11d1760283f28fb480434af1a40c308407b5053de47493cfc24abb8522dadf63bfb9c801ffbbc16dc043f6a840e4c97d6e7866b3eb
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD55e7aac3546c848d4bf2a440130167d6c
SHA12f95e1015a12b48e5d7d6b06303edaf0fc89a83c
SHA2564ad2a0192d892011ad867f4dcc83d7205a09c727ac3b75471a364ecace4f2c2d
SHA512d5c68275b034636cc8bc3f81cfb4292e15a7d21781dd8229237b9d0f7fb3a3c14a1fa9ced472831d63d7ce9ec0467eb068b52176f20b1bebe919a565f8fbd5f3
-
Filesize
3KB
MD59ea96610e449393790877443c54cc021
SHA1357db9ad83cb010e71206c144e1329a4fb898ff0
SHA2563ab49fc5656bce56d3c433cb11d15f82080236f48e078f3cd0fc615ab32dc22a
SHA512a4d8014c2f6ee3fadcb5307f94bdbbc2b06fbed2698df2a6513f937aa57fe814e1a86e636332f4ba820deaea581dd91168f1b1bb436b211d2c262f7cf5c121c5
-
Filesize
3KB
MD5701a67ab60a81b9e4f3e99b21a91ad0b
SHA11e6915ccc96af6f2b7d9be146dd37042915ca773
SHA25676831f3d4eedc6e1c85b70dd7c161b9eba978985d0aaa3d065e3ed2e9adde01d
SHA512dc273a4a0d8ed2306b3a2fb8f7af54b113530963b8e200b2de429eaa121a01ea1bc763c9c08f6f9e4da261a6ed0e96d7920a3bc72a1de52636f966f224a0f9af
-
Filesize
5KB
MD514a7dffbe546a0f6842e4e24bb27124a
SHA1edfc48fb7bad8d5343bf021291e9745118ecfc33
SHA256b3d70d5c3555b4ea11ab49f53613d50a50c3f8568ad9ddde0a7c98d9d2bffed9
SHA5128f19d5c9d4d6130c1179d5a3c21d204c15947eee369277a38d909134289f9c872d8804d78563ebd3ca8f09c8f11b153d88cc0e7d7c335c3ba3e8750cf0a56bfa
-
Filesize
6KB
MD523afc327fe4a576a3cb654e929339b81
SHA1040dc15a8f4c3aed491b75e7ac8be71e1e5cf1af
SHA2560cf2678bb55812a20dfdc253ed3512af9dc96ee04f7b4c1de7a2ed08f860fa4a
SHA5122136d4d522e60306ff1e08e2804514c5862bbd5fe3dfefa775027e9f9f889b745d0772037cd2ecc9fedf623ef597da40ff44a2598d9841f8dba920193ee14cfe
-
Filesize
7KB
MD5e3b49aceb7bbbeab877f0a66f70c6b9b
SHA11027add76633b9fe9b1dcab72a5a689861f338af
SHA2562968c9347421551a051a47fceca1c756227fb1b38cf26813ecab467e6b75c1d0
SHA5120f8dcd0e4bed60cdde205fa511c8e0aa217cfd9f533cb947c4c3bc6909eda8c8e5ac9e6dff2cb9edb4b2a299fd24e1ae42b3e81042fa067141420670af1db287
-
Filesize
2KB
MD5962f36871e01e0fe195d456e84ac4ea5
SHA126472dffc95eb049bd4a7ae4772562346e2d61bd
SHA25642878ddb5fd5d11b040fe09bb53dd5e5713a9daf21aa9ef87136dc7be54654ae
SHA512a5eddd842cf725ba32eab5cdfe7a472513bff02fd2c2a94d6ff2b41f0c733244cf8178740d43f5a85b68528c6592e572f51aeab744fc229c50f0bcc0190ffbbf
-
Filesize
2KB
MD5f5a53d45885fefb57f15e40f2ec15f25
SHA1050444da1f51de07fc5bb1b4b872ef44311f44e3
SHA2569196c6ec6e4ed216113cb46284fcba65d29e432194f4e9a2e7d33b6cfc0df4e4
SHA51252dc961baf95fade32e224b7ac792fc051b4d6cfab43d32a55850e900eeb37474ce348ad442596db8f9615e2e8951780d7898a9e85f219a5307e2d3fed9fe506
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD567e46801db3e82bdc70887a851486972
SHA15e6412405c83629ce1d4851ec739c7bd14324f21
SHA256d31cd1bb99201fefa7e6eaac6bd5eb8c5767275045049ae7244548d47b96ff40
SHA512f7d9af5704c97d78cc6a80af6410531bf9c720813a98c103de01ed194b9d97bc423bff1d9a76a36f1d98c82ef8c80b873ad4d8c2884479596be5c32490867ec0