Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
fdf92f33b31776e03b7f2110adb21fa2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdf92f33b31776e03b7f2110adb21fa2_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fdf92f33b31776e03b7f2110adb21fa2_JaffaCakes118.html
-
Size
432B
-
MD5
fdf92f33b31776e03b7f2110adb21fa2
-
SHA1
d8670ac7103d64603ddbb723b31205a548f44d40
-
SHA256
e8294f7b23b87f706f05e0d36e92df11dfe34ab5acc57d275c8ee2bd8d7581d7
-
SHA512
c343081c8002aa17b65913252eff2be2d23d0ec569b325800cc2f67599a82a26ba250b9e6a364c3335990c08f3f01db1f6554a66bfe61f3482643c5fef626318
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1380 msedge.exe 1380 msedge.exe 1980 identity_helper.exe 1980 identity_helper.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1380 wrote to memory of 4508 1380 msedge.exe 85 PID 1380 wrote to memory of 4508 1380 msedge.exe 85 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 868 1380 msedge.exe 86 PID 1380 wrote to memory of 1236 1380 msedge.exe 87 PID 1380 wrote to memory of 1236 1380 msedge.exe 87 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88 PID 1380 wrote to memory of 3872 1380 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fdf92f33b31776e03b7f2110adb21fa2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff87e2e46f8,0x7ff87e2e4708,0x7ff87e2e47182⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3024 /prefetch:82⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 /prefetch:82⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6073598429464930559,7609639994392190516,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e2f0fe48e7ee1aad1c24db5c01c354a
SHA15bfeb862e107dd290d87385dc9369bd7a1006b36
SHA256f13b3ebe8d71bd0086d5bb82364c35f59a95d32b39753af251e8639360e291a9
SHA512140d026437fd5e8a874cd00b03950c8f010e1a0732a0a1cc5bdde477e7f8315ccb95790bb4c15b8dbaab9468ad532eb885b6c429300a64e39412d976d079324e
-
Filesize
152B
MD57e0880992c640aca08737893588a0010
SHA16ceec5cb125a52751de8aeda4bab7112f68ae0fe
SHA2568649a39877c190ec740a5422284ec5f9ff509b30b2d7896635476873dd8824e2
SHA51252bd0a38ca7f43b26731966035045b1cbd8b60b2d81bdf9aad791cf444da8af8b722ebf3cb364a6e660bebdf23084eb0e30bc23562575b704801669817549f8a
-
Filesize
360B
MD5f0b456b88502f35caefb865dcf0494ec
SHA15fa712a0f7ff426be0ff0fe374556ace5c0af3a2
SHA2563265cc88c06eacfbce60a94418aa236d780084f61c7db382ae94d8147781afbc
SHA51203c71312185fe05d08d4f8e143364b589d96cd9d55f4c4cfcf0cbc0597acecb6156f85fcfe40dbb4ae745d7e61103e20cc4f89f4f76219dcd2afb642ac86e34b
-
Filesize
6KB
MD561338964e44cbd61cbc1c1c89fdd86e1
SHA1295eaa72d34436cfe17e97950cf629375aee4b8a
SHA2561fdb21669101f45943eba7a4cc7617472e8f17f02dd703536a301e311630498d
SHA512d9012cb5d81dae3fb3c08e40dd5c131ceac39598a9c3fb69d0fc27ebd1b0fd7fe913cdcfb2e3790890da86b794bda2a504517f0fba290c31cdf485222d2c3d02
-
Filesize
7KB
MD59de3f8929e01daf645d3a365d666a95d
SHA19a99e5c68dbdd36deb47963e3d33886cf94bbefd
SHA25645785a8bf3011ba2b3fd7a29858d7a98cbf0ea260d97f9be961a5c048028ab21
SHA5122a8044fdf6d825b9328f6c84004d775e6c3d84ac412a8212308ddda5c77e3428e992f0ac16c225a4866b798c387d84e7f0cea480a33a738b608be3dc5cfe41a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD587d39360a8a83b9dc835f172950111d5
SHA1301978f153898ffbec481db2d893fbdb4129684a
SHA25625ef4cd05f08767cce9e168fc9772e5ca1b38de360ec9331f2a3cee442642914
SHA5120ff9c9763501a7972460751aef038ce568817bbb7fb14e3787ff5576c2ade9964542ac03bc8a6dcf606f8069b79a11cdc985a6392b7e14fd2f2ac3be704f5ca3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57b92e.TMP
Filesize48B
MD5b0d1d511cdaf2da346e4effacba98f21
SHA12d93fde4419feb60b3cb00c395c25960737e621a
SHA2563b0720dc01d828227db33ee9db61c7de48ba2202588e03cc656e454a0345c9fd
SHA512cd11b55173de5462f786c89012f790cbce499f381b5c98a25131ecfee440bf7d75c5ec85ecadda66b53fac1d45bae42da5191344017ff88cacf5f141f7d767ba
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD50b439a68f24793694b1865647d45a90d
SHA1f822af65b85ffed80636d5f50dc8c2a3e4e3f0f2
SHA256a039325540861ebd4d1f81d63bef43101532d9f5290883b1c20256806ae3ead4
SHA512a00375a7ddc053192c4e0e23ce1f43de7634682825c5e3d3389fb7053ecbdc3805bae982f8b0b92404daf6601ea86c9e70ecf9445aa8a15938a0e6f888df0075
-
Filesize
11KB
MD5db507ce0d8d53315bc676e4ef55d0cfb
SHA1108bd566343a9b5e8f67190f5f0b3729635f74ea
SHA2561ff3bed89e1c4ae9155000fe62662111160c48e17023e544d5adb697d41661cb
SHA5126aab5c76d7ee45066295f9d0664298fb76652698abb804062945e643f3559fd0bba23a51cd837e48ac89bd452aebc7c96f19e0b113bd30789656d08e274db04f