Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 16:08
Static task
static1
Behavioral task
behavioral1
Sample
d4bf5c1cf7c5c0568ea605def4298b53_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4bf5c1cf7c5c0568ea605def4298b53_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4bf5c1cf7c5c0568ea605def4298b53_JaffaCakes118.html
-
Size
48KB
-
MD5
d4bf5c1cf7c5c0568ea605def4298b53
-
SHA1
a53010f25dffd6004518e7b7e8fd295737f9ef00
-
SHA256
8a9290e062d6cd18a28f5072ea243eefe3fcabb4af531e53e1265c72df235a9e
-
SHA512
7a9a4971a739181824084cde667147a6b099c92065ed15f83f0b362065ad8e2ee6ab91e5371e11689a50fa95491bc5fb322c15512ecdd1071afd468bc89f5111
-
SSDEEP
1536:BWTupBh1lMIQ3ITxI3DOFnh7tnqukcj4r:ZpBhrMIQ3ITxI3qFh7tnq9cjA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4892 msedge.exe 4892 msedge.exe 4440 msedge.exe 4440 msedge.exe 652 identity_helper.exe 652 identity_helper.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4440 wrote to memory of 2264 4440 msedge.exe 83 PID 4440 wrote to memory of 2264 4440 msedge.exe 83 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 756 4440 msedge.exe 84 PID 4440 wrote to memory of 4892 4440 msedge.exe 85 PID 4440 wrote to memory of 4892 4440 msedge.exe 85 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86 PID 4440 wrote to memory of 3824 4440 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d4bf5c1cf7c5c0568ea605def4298b53_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff379446f8,0x7fff37944708,0x7fff379447182⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7020 /prefetch:82⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6640 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6644 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6652 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6688 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10263352142253752507,4095141679247781315,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
24KB
MD5d1c8fc93e329cfdb4cef6b1363e40db2
SHA12d034d8d0056a8c1596714c7129fc31c74a2565c
SHA256facc5d448f6e3267100a4c236f09aa98bea1cc3b19e2b2a0985501ca499c4ca2
SHA51207434e4af30064d5f67158d10b704afccaa31f974ccaca5e76dc9f1b05d76106b44f124c3a94af93eb1b44a5aeaa70ebc33e0f9f904d1cd4c8386b281735d008
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5992381c53329aff95843a6b2ebd1bb98
SHA11e387518955f148044353298e87d1e768f489a80
SHA25677462d23f50180399907a5ae2bf2c47c4d6abd366faaff770c5be03bf7241f0e
SHA5128abfca5e40de2177ef0b92be60e52ecc4603725c5ad26a95c5b254b1911195d50b4bfb2c32af7b4118bfc2235903380a66d2e4705891484fda9584438eb6b1a1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5cd4336c61b8de7307cb8c0f1597acfcd
SHA1f795676f4240736d551efecefecaa8c339de2cd9
SHA2562cafb477eb5c21beb3c748385c492a2598ff453a10ed4dc928d63916eb5c5d4f
SHA512d52b00a326746ebb17e5c88acfb34f82ebe6db046b638532f25098e02fe59cfbf1aa2f93e0565e03c74962400a8dd955dc8531c25a0bc45dcb5013e58be0aab1
-
Filesize
3KB
MD5b146561b28a1770da0a45f5761aa6484
SHA1b9db3e28adc3a7021b349d0d6ca44d9a95ed0710
SHA256a230f7192b34710621f2483a836085996911ed68d51eafe79c30aefa9d9eeaab
SHA512b54d195205d426afdea5cf913229eceefaa180200b7f00819458733125bd8897ee7b04947ec028d78d3d41672516f206e224f9ab5d8a1f812784230ae752005f
-
Filesize
7KB
MD5f74d345b4cbed67223f6c3e1ff3e9a6e
SHA197d75220f4903ec9588cdf260547a485b6ba2271
SHA256aae3b79cb8fc3916e990c3eca2cfc857df16f600bedfe4946a9e866b6b4adf82
SHA5128deb0e2086d1f8d3cd0aa22c6479eddb98686f374855ad81584886204b997ff685b957c92fcfacd9f9a8b14ebdd107e341f696caff1113ed3b264dc5f357bec5
-
Filesize
5KB
MD569546327fb63148d6c2a49f1919f6075
SHA1483c6a0f8fa1ded2397abe3303a0435840dbb794
SHA2562f425764953195a8450aff5ab4ccb8be718121809342cef8886ed48601df0314
SHA5120c313358786d788d6a8ac7ca012b5dd723ecbbececd7fe0e70365fd4f4d22e5f6491b4e8a146feff1cddfa8c7f161809fac10b2506ceca891e862a4e4d4a5267
-
Filesize
6KB
MD500eaa0c14fd98f7de77ed099398c3a02
SHA16cf446941e5aa5176966dcb75606f8a37a243264
SHA256725bc889f4a2fc2f21f7332d5fadc7537c52a984e633835037051507f5b9fbaa
SHA512e79cbf61c29d47f1606d2765e78dd29db21d5315b87cee90b7c0feda5fa908e8db1e6353b5533dc5f6dee8fc5eda0ad7fef85be556742035ed00f93c1f4e1fa6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50ed89b55b8e99a763e675a046cb83f4a
SHA1d0990c3afe01e36ab060667cd417663a5a43a20d
SHA256bd87db4990c69a33adc50c147e9e22ea6d5cfeeb142b921eaeea1627bfe782cf
SHA51263edd25f26776a451f5453f96018a7cae8f795f915a8a5e5264ffb6e9adcdc0b7effdeaa34fea86302978bc7f50be613ae2ee85993a44d69c8cf112ee5bf3993