Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
19dd9403e0a04f9d32611b91806e6052_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
19dd9403e0a04f9d32611b91806e6052_JaffaCakes118.html
Resource
win10v2004-20231215-en
General
-
Target
19dd9403e0a04f9d32611b91806e6052_JaffaCakes118.html
-
Size
218KB
-
MD5
19dd9403e0a04f9d32611b91806e6052
-
SHA1
7c376a3c4354272b4ec60731ee472163c75ab53d
-
SHA256
20690468e95190491a7edb837d8f03a37bcc43b16425cad556e6d7de8a5ef883
-
SHA512
f58690c77b6f5f49d3ef87ba0f84a3ee43a72970c08a57f8436ad04f02cf9957f92d873a19f115e92b414f541d5c1211be2bea0f1e9b9ade6f96fe8c18e3352c
-
SSDEEP
6144:7lNIIIN3G4k5QhL8atV+BOniVQ5MIsuQyf5bTM+MdBXpKgXpgx4t4HO9mge/bE6d:JNDY3G4k5QhL8atDiwMIsuQyf5bTM+Mg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 3568 msedge.exe 3568 msedge.exe 5444 identity_helper.exe 5444 identity_helper.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3568 wrote to memory of 4576 3568 msedge.exe 87 PID 3568 wrote to memory of 4576 3568 msedge.exe 87 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 3604 3568 msedge.exe 88 PID 3568 wrote to memory of 2168 3568 msedge.exe 89 PID 3568 wrote to memory of 2168 3568 msedge.exe 89 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90 PID 3568 wrote to memory of 5092 3568 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\19dd9403e0a04f9d32611b91806e6052_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbb0846f8,0x7fffbb084708,0x7fffbb0847182⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:22⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2392 /prefetch:82⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6944 /prefetch:82⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6832 /prefetch:12⤵PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2148 /prefetch:12⤵PID:5704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6500 /prefetch:12⤵PID:5712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2276,11682007633054457837,17164251307456887657,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5424 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
Filesize
22KB
MD579e675d72bdce45fbc43984cca5b1e11
SHA1498bd777fdf8d09e6508262fbf04f2f7b4fa46b3
SHA25660cc64beb4a9047b98408732d4ff65fbd4dfcc9430453436e72c3e0ab57d085f
SHA512760c8fd2c43f6696b8f20f0e475d68c45a650566dc8bd8d719d4f64652c82b20f7cb37bde18af8c7a5226bb7c21faa0629119a8e46fa768a046a62ee290da889
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5ff6da9f68ae375cbc3f72a8ded9f61f5
SHA165c1a2433c0c0c54178f5ab3429977714acfac28
SHA2560d180132e60628a8bb544dce4bce06dc761c72738b135f4270877737d65fbf20
SHA512a8658e6ba5ca10410141bd0518ad463688af9d44a62292fe418d3184d18a980ba134de42399b1d00183f584f5f03a65c6023b82eeac011fd8ab0b1611ef20d95
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5e939676e5926134735a1b975095ec82e
SHA1c85ab2ed790a0c87210bee1e6d72a208b6c3f680
SHA25691296fb010714ac11cc037bdac2aac89835510f1fa0cc63d89ce46f18e8e1771
SHA512ec8f3b0bab0c34fc1b65144756f4b5288a2c995065b08808154edfe1703bd5d234c2014ebbb2fd0eef6b1b86050adb1d3926b9657afccf07b43a17fee7f4c743
-
Filesize
3KB
MD5439ad6b042aaaf2b6da549beca283eaf
SHA192604c4029462917adc7a0106d46574143ea8f68
SHA256d7d100b1d5dbcbd2b53691d49082a79a0bbdbc43495fa6aa83c1a8d389437c4a
SHA5128e088c9cc248d6e8f1df5b694544af7093f01dd37f2d240a4a43f094d04475938c1dd3d6db5077c8d90d124504aa1b58ed131f834ded2a7d5f830c26e7ee3dea
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD567cd0c97171d74be57bbe1da6bdaa133
SHA18f0d40d457efeed499af4326da43269a80b9c883
SHA25627fa72eaebe69c035f1d91e3071cbaccab1103e6d52778989e157fa546f0147d
SHA5123c5fd4ef8ffc701b06cd8ff3dd741cb88ea44828a601f4069b24299469106aa39685e0f497f056cb26900cdbd97b5298ce962ad51fd0c8d1a3b2eab6a16dfb4f
-
Filesize
5KB
MD5193e39af4d28bf590d904a558bd769c8
SHA17da2525a5b86a2399d3e48e6f509303fbd71d12f
SHA256cea0318d8c984d08802727e55c589bafd6f3f4d2e1c4b9cdad83f27dca2f080e
SHA512de839e96719f9317adb965bc146fadb5c2775150bd56826fd46e45e3d7a6bdfcb181fc5bbb8942ddce6d9bec71af603ef48824a819cda638581e86ef15607349
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55cdf22c91e0f79e49193f28a399c7734
SHA1936598a37e7d113d7564dc815f81664146ef3a12
SHA256783995de740a47d828adc5545c06e9c08466c1e378851ab702f434eb753fa3a1
SHA51262dfd446c1d316a4e4178947223a800169ff1570d3e0bfa999aadc3d104aa2a9d244b1c6a919eb28b0acf3f88c3799f27afe015375c11d8ca4bcfa970b8669f4