Analysis
-
max time kernel
134s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
11252c49aacd76cf1a99f9ff697b351a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
11252c49aacd76cf1a99f9ff697b351a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
11252c49aacd76cf1a99f9ff697b351a_JaffaCakes118.html
-
Size
104KB
-
MD5
11252c49aacd76cf1a99f9ff697b351a
-
SHA1
f35d1ba1860943b4868a0bdd665e2a5adca689b1
-
SHA256
9648a4e17a0fff6775c6f47399dfb9a0a19063af6e81ab2b4818b2463bcab156
-
SHA512
b02204396b22b79a5fc30ddbf066d3355dcaf34bf45b4f7e3c7139d9f4337c0581455e80c743759da2838fbf9fd85c8245a441cbd6d118ede18adccec1ba0b23
-
SSDEEP
3072:IUR1anTYpzoSGX7TTvWhfiybV5IB9JJxMh9yi82s+QOXeR3Gb2D3WXAIw5Q/K07B:janTYpzoSGX7TTvWhfiybV5IB9JJxMh1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 4544 msedge.exe 4544 msedge.exe 3296 identity_helper.exe 3296 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 4836 4544 msedge.exe 86 PID 4544 wrote to memory of 4836 4544 msedge.exe 86 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 4060 4544 msedge.exe 87 PID 4544 wrote to memory of 3824 4544 msedge.exe 88 PID 4544 wrote to memory of 3824 4544 msedge.exe 88 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89 PID 4544 wrote to memory of 1956 4544 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\11252c49aacd76cf1a99f9ff697b351a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7fff129b46f8,0x7fff129b4708,0x7fff129b47182⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3078256921233899477,10064501070117139324,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1268 /prefetch:12⤵PID:664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\78032605-5f16-44e1-93fc-5121dac03b2b.tmp
Filesize5KB
MD570c244dadbe43602503e42c42dd417b7
SHA1cb3004aba9b12bf113ff28f624935e5b83dd6d37
SHA256d61f721924b75bec7361d153713da49955112d67e74311bee339af2bb23c7825
SHA512a53f00af70e41f3d39d7706e59b12288c426400d84c93c86904f1e610245469632e746686ccaab6eed277ab1df415a6eeeb00091edeaab77f6f2a4a4e1d7fbe9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5f8edeae3a3a46f2a45452a6a035f709f
SHA116c36248d7a94d4a86ecdde0b00359a6aa2c7339
SHA256e42a87e70126f46c9342eb2f01620decc41f58e4a399849d546ba410cde5cbcb
SHA512a200b801393917758f2c7576114420aea307e1f0e2ab791eed8d49da7ba2d843256ce1207289ea447e983349f87782419feb56a6746eacbc575ec7b530fb10c3
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
527B
MD5c9218c511db0b518a1fa3f87d16d3413
SHA1004ca8498e8debfcf474b77667a046c89c18f660
SHA2565f4a8dc7cb6091bca7971732121f5136c2329f64702ab34906abb5363cd0a599
SHA512162073b9d7ebe0b993821765102969ce3b8b2943749eb6712e95edf739f7a9b16ef5eb4ac688b276bd6e9801a87863c81221b1c55e123103fc6fb4b8458fb022
-
Filesize
6KB
MD56971603c12dd4f3ef2dffa49e88ab382
SHA139f1a511f1c3789c1bbb95c697cf2256f2186eee
SHA25649d13d21b86ca8648f8ee15714b492285790473ac963ef2407a3fec9911ca012
SHA5121ac231ae94c8e752e49206c8a54e04177362ff7e2f941a79112c96b90244d8f8e6aadc7ec0ed65c1e3d8dbfa616f81452a9ae0830255514512cae290aedb2004
-
Filesize
6KB
MD584d11d58503da494226952f1022e0a40
SHA1ad278f01417d88ec2b57eedf89511b03272272e7
SHA2569c4127dc0b7b0fec711e94416691759bda9fe606a90596776d8445b6e40fd13b
SHA512807c864af878db12c379a79d7fcda64156d627c7e3ff087cfe3adf81ba8dbd433b738edf504199f95ce641cdab77b5ebf5380829d932c76876aa65858b72f907
-
Filesize
6KB
MD5629ef8d025af980fb3650732ad3c4bd9
SHA129f246b445e92b39e8668cc3f7744a7ebd6acb24
SHA256484c9330a0dc0b20ac1c8ff553dfeae8c5be8d8ff62dc1c348564dc2a9f617c0
SHA512be9a69d8003c25d2298829825314294249f350bd645078273972652748539afdfb4ac09015ed186988fa116451936ff9d6ce0fb097acacb4b898c2623e9cd517
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57260e881bcdc488ff8f3a4becca38783
SHA14aadbbd3eddf52bd77d3cb7c1fd4773fae64f68b
SHA2569cad7b026cd01556b95e929eb1b7e9e56ce58dd9eec1504a458acaca7720e408
SHA512f4cdea7d5e356944ada32d55127344d893f4fef8964a1fe76061bc31661525a9c9260752f485124f290047d45b56986e444db2fa900aa360c37f82bc3e69d195
-
Filesize
12KB
MD5a68e26c7be280e45b25fcce561dba0ac
SHA124dce695b6f16a077372e01a59e4d1ff9ad63e35
SHA256b0202632c9ea70fbd0d6431910387a441143ac497a72c7aace55c6d39a596944
SHA512eb000f32dca60926d9627b5afd0fe48297e6796c4b89c4ff57fb55e12672882265ccfd2db30de3f8320277b643615d53a51a237faa9fdd9945fc2c516a8a7556