Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 18:43
Behavioral task
behavioral1
Sample
968577348f5c3ee70428f850f8d3bce3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
968577348f5c3ee70428f850f8d3bce3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
968577348f5c3ee70428f850f8d3bce3_JaffaCakes118.html
-
Size
53KB
-
MD5
968577348f5c3ee70428f850f8d3bce3
-
SHA1
4d71932f2d0464680107f061f100509faa1396c0
-
SHA256
9a7f3c59e2e76e15b912b6ab5f0e12209f788da6f6229b4ef2273f6ae5c091ee
-
SHA512
2c880a892dd6b99b73e665442d9db891f9853697281cefbff6f6836b0144e1517f7c3ae8512a21cd653b947166367f4f6d63476f0ff9f2610e794d88a329bb60
-
SSDEEP
768:dVS+jdlKiZ5dYhXWE+upjWm0mKcNrxRQnhbQM4qkkUnUa2Tb0bQpBfbHuvBA2fw0:jbI9vZRQ0HnT8pBfKvBA+PS3wt8w5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4768 msedge.exe 4768 msedge.exe 4232 msedge.exe 4232 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2372 identity_helper.exe 2372 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4232 wrote to memory of 4616 4232 msedge.exe 82 PID 4232 wrote to memory of 4616 4232 msedge.exe 82 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4836 4232 msedge.exe 83 PID 4232 wrote to memory of 4768 4232 msedge.exe 84 PID 4232 wrote to memory of 4768 4232 msedge.exe 84 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85 PID 4232 wrote to memory of 3048 4232 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\968577348f5c3ee70428f850f8d3bce3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d0cb46f8,0x7ff8d0cb4708,0x7ff8d0cb47182⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7000 /prefetch:82⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6728 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6780 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6584 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16399115178474438542,16336136089903746312,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6828 /prefetch:12⤵PID:4872
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
20KB
MD54b3121a05808b99aa6e0cc12924f77db
SHA1ee5805bb76c384d1e1667aea2976bd2f4f94c7cc
SHA256e4fea32bac89d9ad34b13a25b0b4da1321920b2c6be2cabb75ff91bf6109152c
SHA5129b83d55691b41d2a45a542d163c1b6a47208969720ec1fd15233f29ddcef2243e79895cfcb008767f91b3d1cf3a6288248e8b1ec50027eb96db04cde56cb2605
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5858505fe7b9ab86ae7da024a41f4ed4e
SHA11b89668c989b61c4901149a3b1733a86c0f260e8
SHA256c845f01959ed85785dc43d1b7fc1ab8fa4018dd3c78060d3e171926fd1119aa5
SHA512615d7b271afc3dba22673bb64fa061c5c3be566e1f1277916207e0c65bc4d096caf5fd07e27f742f1d2ad8099eb64b0af8cc670fb9fe5b475dfe88ebda15db49
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5470605d9b3b467ecf9a0d68abd004beb
SHA137f6b53ebf499ae5fd5d080906e958d62c3f4ab6
SHA256520cee6b2a6108ef209500b62ae9307c212fdbc1c08604d89a291918ee63eedc
SHA51296243ef7e4cb47108489198b2f62cdab22e664a7e28aaf9acb179aa61c78a5d358119ba59b05d040f337b5a90dd29af96f75038b46d41234c5ed9d52c3ede3c0
-
Filesize
2KB
MD5b585023c7514a1fce3b25c63a5d7b14f
SHA1c98553844ad29929f4d18defbf011c35ca0c437b
SHA256d058f3dfa9fd6b77fb79318e1762ca77cb4ff5edd5160fcf4e7169e67bfc45f9
SHA512925aa652240c553126d09538d8e09e92945e16b801aeb4975bf7d34fdfe42db5c938c02c994602189c9fbd53d2c070e909b1b0347b4a274d3d406ccc0db1890f
-
Filesize
7KB
MD5787c6795ad52b947706d577cc33a30d6
SHA14e54a75cfc952115d6acf109ddb46a615773ea93
SHA2563bf915afb2b3035e7132c24258689a8a217329f03b2068158cd6c0d59a8e407f
SHA512a3cf593dedbb84a9619743b1e4d64826c1568fc310914b700ea579ff1d5c47cfe575c5ba9bfa8f8edf2b31d2cb3641310537fcbfc0b2eeab31f0bd8ddd1761c6
-
Filesize
5KB
MD5fd28c8fc8fc8253e68613751356ceb82
SHA17b02287571f504123cbd40aae61d93fd1c303bf3
SHA2569e75c102b0a2e09c3aedd1642633d964d9b7d4507a91bd6e2a327bc07ba68788
SHA512ea99ff0cfdfbf0048c1863d3e166a679749daecde0ee47c6a2dd20f1882c3ccf41e7a5958da70a2b29c6f3bdd55cce77a9258701e91ba493cf2b2634dbae46b3
-
Filesize
6KB
MD58c7399b4e7ffd873fb5684c2b22fdfaa
SHA1a9d63758ebe43c73d22430e9f7790721cc04c634
SHA256bba3d81200039a8025796ee07bcfe7c25b56081edf32b5eb87d308a8aeb77afd
SHA512af2d43ee52a910508ad6fbef035f8b1e3e79815804d4312ea4fa03d6f65e9352b7d441dd119bb1594ce523e45f9b1f9cfe2f1b89c954ba089685cc24805e53ea
-
Filesize
7KB
MD5166f7c9180e63412f9e1c216e7db19a2
SHA1e0784eb6658af4881ad35e93a94910243ed2f6fa
SHA256919223e968a42b95c092128afa4192597825a470dc0347f68423525c200f68e8
SHA5126b203584684be08001f527d2272603dd1bf767aa1bcf456c6e37956b361ade8a86926b9089dded38587565d1bcbf349bbf88de4f11a9abc3c78d3117f83d4460
-
Filesize
873B
MD59fb96202aa74ad143aff05bfa4d016a5
SHA1021bb785cfee39e131912c378a6fcc559ce76c94
SHA256cf7f476ce01351edb030991aa3fedfe01cd4ce8ff57294b7ff8de55ee7b397a4
SHA512a2ee1166f3147699994496ebd0d1b63d1ccdbb1b099cee02f67ee79bf2f0c38b382ee15438db9909f24f7e73480c8382199383b1510641a0624b9ba5b613ec86
-
Filesize
203B
MD5d9fd66ca0f20ddf0f4e5458d1a1f33bc
SHA1cf049d2fe570c7cb003ab290933eb61d993536f5
SHA256d75c51cf7a526b005d5777744c98d21c71841a4cc8b2de1b93b9f68cc2a48882
SHA5125ec126e6e7aceaa7501f67dca84f7f6012b4af50b5a9f7bb6a6d93fc463a44cf1211e1984cadf96fbc5e5ad1d137168eece4b39425312f1d76fd346693fb9a8b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5e367821970d059133aedc24313ad14cc
SHA19b21d35a515e6dec4c83e4a50757eaaa10368787
SHA256f2632b2dc40cfc7349b047bc02d46a0a2a51f55e06fd4b1c0f5c16e82ab265c2
SHA512f52dbce00758dc24524e2a7bbb297f440482f71edeb465b3db5b92ed9d0ba66aeef6fc04640b5ab453f0aaaaf3b789d86e13bf458787dd7d604bc96e336e93ef