Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-04-2024 22:20
Static task
static1
Behavioral task
behavioral1
Sample
03c1294d61cf01cf2acc0a01fabe71ea_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
03c1294d61cf01cf2acc0a01fabe71ea_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
03c1294d61cf01cf2acc0a01fabe71ea_JaffaCakes118.html
-
Size
99KB
-
MD5
03c1294d61cf01cf2acc0a01fabe71ea
-
SHA1
f401a2c728563c30dc7d184fddf1b294c3c9653a
-
SHA256
233a3b1f4fe78cfc12277e05dafff6fab2f6b333975d918246802bacc4f83875
-
SHA512
0e0a8621356d5739d66d71e2981f87ee756ad2e4f67887ec03e13321806b1a7650fa0413f75e3e0f8c7d004fbcf2cf7ee742138142dadd0791033641665a51be
-
SSDEEP
3072:u0e80SkAcjyAcFjAcKAcd6lIJx8NFH020w04w00tQHYcuZueSUuRwu7rMQUYAt1z:u0e80SkAcjyAcFjAcKAcdANTDlwdtQHu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1564 msedge.exe 1564 msedge.exe 4036 msedge.exe 4036 msedge.exe 4692 identity_helper.exe 4692 identity_helper.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4036 wrote to memory of 972 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 972 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 4908 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 1564 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 1564 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe PID 4036 wrote to memory of 3424 4036 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\03c1294d61cf01cf2acc0a01fabe71ea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceba246f8,0x7ffceba24708,0x7ffceba247182⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 /prefetch:82⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11919439296670984684,14868385129480323216,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5532 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5e4d1e42d9dbb0cac906abd4ac0e2138c
SHA152af528cbb7d13f8a886052793bd20bbda9d764c
SHA25631bfbf74d29bc92813e9ba52ad0fb99ee3c5d598867e4dc74b3da3a38423868c
SHA512f06bcf0462e6450006f9204decd451526a2d1d45275e973d90d895f0da0adefa692acaa697ea5266ee1b80c2b09acf1e9e217ddf63bdbc7ac8620a20449ccd30
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
96B
MD5e97cff93a6f6273cb3cf1b751de2ca20
SHA116abf874ffc08a55ecf1bebe5d0dde44785f76f3
SHA256f13eede2e49bc6322bb6869add875c09d3f94d9716ee93b86d64a8870fc6b017
SHA51259bca330354a6ff3b762757019f7c80de5416311712f42b401cc1569a4baf7c5558c614ca97d8d91cf2d3217bfc1409ad964c0c156498226bf88262a8dd2ceb1
-
Filesize
6KB
MD5a208bc01097fa118c992c413a1418ef0
SHA1497864c030134fade3ff80e5bc62b4bbd6688daa
SHA256ffd333b500c0436dc32a75c8cc90617deca6053e0843e70ec5f71271d270e9b7
SHA51239791365fc9b2f590c7d70825b7c0bcd220567987d293446c177585d0e0f5d3a666a2bd144f1f323bf6e7a625d3636f9a98d154a0388edc9362151c47f1d1db5
-
Filesize
7KB
MD5b813d1fb8a9881fbfaf3cb44bcfd2f16
SHA1e0ad2ec984269d0793ce71191a7a52832c488638
SHA256ddd0028f7d7b6270921b20d2ffd66777f0fd34a47aa91c6c3cd80bad75cba06f
SHA512f4cc899cd049bbe00ac68ffa07af2ea8e8cc5fd37a69636082856f50af0995de899f54344b184514bb6dd390650052f0cbe4bc3b737020e7e60cf9ea9002216b
-
Filesize
7KB
MD58b0547d0c64d613bdfa61f5f8d7d71bd
SHA141ccfd1ecaa2839afac716dc4ffb590fa5fbefc9
SHA25620554c3cb458c0182bbb321dacbd64d128b3fb9708363e2082206adf416e1e1c
SHA512369e4a8090a966122fc0f02d517d27c10db960d0d49c5511feef09151f4851381fc6ba3a7462287b668245020755a4833ec94e1d03f4a0af94824cca77b50439
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d66615d2-9157-4b8c-a21d-2fb3910a9ed7.tmp
Filesize2KB
MD5e0f5023bf441041d6b8cd90f4639ef9a
SHA1b0e00c69068939093ffe2e2884560965ee69388f
SHA256be6b99a67e0f423c46490434a05e26426fbacff233c17aa1d06465023e140d01
SHA512922b2334c113dc06da5c77736f59df4e53140302292f1a7abb4f49912ca7e10fa1d9f3b68e1da5d9355107a2b21f5f0db5419b5cc9f3896087f47fbc23bfc12a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54c31dea4158ee7302ec0d2637327e418
SHA184a12efa8a5e068f89fdb16a551f9e20bf30cfab
SHA25638d7dddc64acacf771bd542d2af91b7c4c4a56f9dfa8c31326e37eca554efb23
SHA512d73b82d96f69ba1a9b128abc4637a693bb902b11dcf1bba90ed2a5d3a9d0d69fe3de25038cc47c7b4abd9db1228bf8cf8bba02c6c72c0e94774c556380bb97c1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e