Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
dbce664fccbc32ce9d056efd06ae9012_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dbce664fccbc32ce9d056efd06ae9012_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbce664fccbc32ce9d056efd06ae9012_JaffaCakes118.html
-
Size
166KB
-
MD5
dbce664fccbc32ce9d056efd06ae9012
-
SHA1
b2a9c1880e6ab3f19d4de546947965d0b28fddd5
-
SHA256
add98acfa156c302f190ff865621f43e6927154fb5e998b2063e6242cb7af680
-
SHA512
e0a272160d02eeb766cc8be049fbedfa9c20e53a3bd327031bdabe9f5b3e7a6e9f2c3335964fd69463b413e0e22bac7d04758a256e34a746e62ba94b93f4cebe
-
SSDEEP
3072:jRcVhIVs2LQegU0Dzvj40MZEPjLpUxAfYxslxNcl8CLcXmNRS/8sK0domF8YnCyA:VcjJ/jXmNRMdOnj2qncRkR8+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 4600 msedge.exe 4600 msedge.exe 1772 identity_helper.exe 1772 identity_helper.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4600 wrote to memory of 3064 4600 msedge.exe 83 PID 4600 wrote to memory of 3064 4600 msedge.exe 83 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 3924 4600 msedge.exe 84 PID 4600 wrote to memory of 1340 4600 msedge.exe 85 PID 4600 wrote to memory of 1340 4600 msedge.exe 85 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86 PID 4600 wrote to memory of 2488 4600 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dbce664fccbc32ce9d056efd06ae9012_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff526546f8,0x7fff52654708,0x7fff526547182⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1908 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,17889771817049717898,9049764721737611572,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD55da0623093c4d352117eae58d6c6e20e
SHA1bbcd3796a084a9fc1e3b3a8e63bb5d3b8805dab1
SHA25692a989ea90133bcdafbe5d6eece89797d229531b852aa375ac216c6abd67e4c1
SHA51229ad20b97f659cd13301d894792f8d45a280aee817f771d22ee2baef34c2fc2ed3dd1ef2ee356f861c922b5fafd54b1171bb94edfea91d534608f66507aafd6a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD5545552a654268f0fa6ff166a0e7d8049
SHA1c7a1aa35d87bb20c46a571ab35f2bb1df4087e88
SHA2567bd8c769f7a2153aac4efa133d6e92688b058f3f06b2d71fd01da2856cca91cb
SHA512bdc50dcf2b65f7bd24f30bd43ad1234b6aac5739f5dfdac8986bab3e040c869d64dc752dab532528a5b657fa51dc6a70569eab5a2dc609bfcb675c109f2d6b7e
-
Filesize
3KB
MD5b83d70c0cb487758685e2e3b4e147f99
SHA162a1dd642d7e9fe7f5edbd5aebe5690f0a855ca2
SHA256ad0b8f42ddd0947eefeeb1cded2831447b7349d2ed0f1a7b8f1033f3b5e0158a
SHA512fd5723a6f18ce088c4f160a4fc8fe8c2b2cdda8b3e732c127c6895e54fcdc177caa4b08ce53524cf4a02e089442739009a0d98d9d640d36b05422a8c599cfb97
-
Filesize
3KB
MD53ffc2949fe0bf0e9cfa8d1188abcbd4b
SHA175356833a2bb87c0989bbde615926002bed2de47
SHA25667052dfd9249a880fa85ea0851a2aa25f9357f1ecd831c3926a15db266463005
SHA51238c92d904eb13416cd00473708ba040c07552effcc8d5883fc0f3d7981bcdfb2470bcfd5d32d42975f27ee6fc5fdb9a1a71d038788e9e044cfe47bf0cb1542c3
-
Filesize
5KB
MD527c90ba7581c8c82170ed117156af2d2
SHA198e710713c54cdb83ea34ce4b17256ebe0a15caf
SHA25646fc9bb065652fd35004addc6ae9048f51d29536600aaa742c669686b7f36e33
SHA51236c9e9df35a68a6f245f55118a06d7d3c6d9e2cb586161249af30954e0ccfa7dec6fa76b00cc7b6343861fa79ade32fdcbfd11c32aa6c130c357ef300f477bec
-
Filesize
8KB
MD51b26324ee52f1ef54cc3251750710b52
SHA1487baab0680419b043a7335be80ae75780181ab3
SHA2562552aafb5af337fb9673ff04642e50381e3928b982d7f99ccaa023080227ba9c
SHA512d58559c343ee8aab0e20110086e5b856e260ee715581145794b53bf460c24dd616e12cb2d047897ec0a778e277564bf4c02a651fedf6160e3cb18d45bf52d210
-
Filesize
7KB
MD5d6a2f43e758ef1e217ded7a9b98d8b39
SHA15b6619171d204f24e95134e987a16da61889e38a
SHA256991f7b15a38afab71a79e72786b521eaf681ce3406d7145aba4ae93c041924d7
SHA5121e0dba2dd3682e1450990faec8bc0e7f50a2ffc1d13ef2b9835f4c8b4b1bf5ff90afc872f9a2d2aa1c578ae22bff36b311aa0f8722eee157ac592cea4a1fa678
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dcaf3ed59bbedd74e64ef5fb59df64d0
SHA15dbad345a8bde6a650429c0babbc1bc302bd4a6e
SHA256d106a98980658607a90d0671e24d18e49ae76e8c89b80546c9389d640e191f16
SHA5129e42caa6768d8c5fb6792405bba6d5a61753249f39988921091b03217d5c3d3ada6188b895f95225bedf8429e112a6cee3c63e38b33be769aadff63bb8a0648f