Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
319e3caff51e71c605b15c1e0f3b7e79_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
319e3caff51e71c605b15c1e0f3b7e79_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
319e3caff51e71c605b15c1e0f3b7e79_JaffaCakes118.html
-
Size
179KB
-
MD5
319e3caff51e71c605b15c1e0f3b7e79
-
SHA1
3cc45e51ed6bf4152f035d079b790926daeac574
-
SHA256
6e4e82994ed55061899c19fe8d9004ff9d0fa27a29c8dbecdfed3578d888fa5f
-
SHA512
b59ac45a64b524cf225264417bdc453203ea59476d1c0575f37de9623ff2bb7c19189f20054b56d244e04cbfad72a33e1d634dc552b56886747366cb8abcb9b4
-
SSDEEP
3072:OQ4SPZD3UcjvG8rM2hFcXmNRSFldt+Tatzlg79g7CFY0ZRxi21yxlg:JJwXmNRK8Z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 4796 msedge.exe 4796 msedge.exe 3532 identity_helper.exe 3532 identity_helper.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4656 4796 msedge.exe 84 PID 4796 wrote to memory of 4656 4796 msedge.exe 84 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 4996 4796 msedge.exe 85 PID 4796 wrote to memory of 1612 4796 msedge.exe 86 PID 4796 wrote to memory of 1612 4796 msedge.exe 86 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87 PID 4796 wrote to memory of 1792 4796 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\319e3caff51e71c605b15c1e0f3b7e79_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeff8b46f8,0x7ffeff8b4708,0x7ffeff8b47182⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3044 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,4955450977922397841,6202084546340218911,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
23KB
MD5c6ee151c95d5bd2339c67eca774449fe
SHA1c2de7e4a87b91ddd246fee53b8274b35fc55603a
SHA25665edc4727e2bdb04a0ad28564af17bcf3bd7029811429804d283c8f0e186ce09
SHA512eb04604f00aba42cffeecf266cc7dbfc096708ebe615ed2141bd422585db26a12b54f9c22041c798cb01e4c3d3e5c70fff935b0c7a508fbf61f6201c3dc678b8
-
Filesize
61KB
MD5529a606ec93821f9c2706ebe993e1ca8
SHA19add401d95927c2000b81e9d023440ffb2dab103
SHA256df1283cbc0a6fe37a59059001208514d5b254b59be8074b1ea0e7cab49e43e39
SHA512bc789553300e2d22a71b3d146e9bcdb963bde8263fbb9e1d6a3fba5ac68432360fd27d41e66f3278666e639e36c670453082a8b9bd3770728a87acf742414b37
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD54bcabc318e70dec2202140479e05e9bd
SHA1449082ae807e4979c885c20cba788a6c1a10cb14
SHA256904e10ebac5dea41e3bb1190553b53455894d88f5b0c07f8915d6e5291341b3e
SHA512a1ea778092d356d69dd373127298bdd72b2ccc1976f5e835fcea4d42280e9a7ab8eab80c7ca482851d871b39e857af8b13e167e9c0366c7e96a3dacf39ae9638
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD58f684e33d47594f113c039430f3b64d8
SHA1f9d81afd0b623081d8ec48671b1279dcc6cbd88a
SHA2561699e4e4098f65da5116bb0f37441052f8d210d182269aa9de093fd8a0bfb199
SHA512f306bad0f127bea13ffb314cbad4f71860e88fb8e616109ed2af9eb93c4d6a7187ecd24c628e24a9b64daaf04e7c67647cba0118ed3af0327484804cd3332dbb
-
Filesize
2KB
MD5b2d63e595a587f077addebdc70328c75
SHA1ce20a07a892e956aef3c2cd56e7db5458e5e0831
SHA256571e476932895ac6110900dadf46032d80ea0229ca0dff580741f118ae1b3a41
SHA51278d3f107be374213a770ce5d6bea8a7953ab249047dce088d6aa9a834b5d65f7836e617f425bafe3d5a647ad5b816deb0fc72d6e26952283617791dc344c4cdb
-
Filesize
7KB
MD5351bdc7f92bf0242dfc21b92fab46215
SHA12dc96da6b29707aa456ba888475f6fb4fa150836
SHA2564098ca96cd0bc19df10398623d4c68054e42726b2926c84f4ed96ad608d04aa4
SHA512bedcc996819ed8135c1c5601f0883cbe2a83fce57831a7b8a63ee8e05b39f45d2e4a8f5a3e8c820a8a6c04d825aafe65bb066955c6a9ed23b7465f4521e4b80a
-
Filesize
6KB
MD5bb95c83d78b4a7f5d7ace886d6e50a59
SHA139a645f4551c504c9f2a14935acd86c29100e626
SHA256c47591041d535337a6b4a0b5065d2dd5daab76cd1a0267e0061ebb87091cf2d0
SHA5120b0e3c1b3424efa0e28df6487fe2de602b561322221182e79d2b035f3fbdf768910a00cec8047ca41153a0071600512951b419b6e7692f2f745a39d23d74207d
-
Filesize
8KB
MD57db60b6cf7491127e53991c84353ced0
SHA116120f2e59ccae5a74c0f3fb8fb78ed2bb1c8aa9
SHA2560248be4c07a220e3fa60b85d5df3a2d7a36c7470dc0e80965dfbd01c96da7831
SHA512a49d374e2d8634a6bc5ea35df9422ef1444c997c26c38c66fd274bd5d6771a6469c946d3cf27ff10bc2294f357ca6c0698e04f014b1f9345477766f93ef8a4d3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD53fd39306b52b2abaa20cfee21f3ab9d4
SHA1243d44d364728796df913a91c0b0b2908a6c9109
SHA256316b8119d8d191290ffda66dad59daf77ce0ed0c35d3a4bb2ff7b135f54ce54d
SHA512a353e2542f5dd9db60914de93585c0abed5803abd3dfeb552d812b99a02655b379089eaf06a912797c14bae55d9f8a87753049c5baf9e1d72b7838047ead0510