Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
2bd04cc2bae297118f40cd7b32739f86_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2bd04cc2bae297118f40cd7b32739f86_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2bd04cc2bae297118f40cd7b32739f86_JaffaCakes118.html
-
Size
40KB
-
MD5
2bd04cc2bae297118f40cd7b32739f86
-
SHA1
f466d9bbad3578d18193b85820b74f7481b0fad4
-
SHA256
010b23a1a495a7c006b32b1f36b4ca685cddc3df01a777b2d26918c95d0b42eb
-
SHA512
268b1885b66344bc066a7c1ac95867dcaa8c35c24dcd057ca889fa33dcfd626455354ed813e1cf8b37bb4d85c7d0da9938dab8d7afb030f2d71663ff152e34a3
-
SSDEEP
768:rIYpHvvCIohA4i6OAnjUG0zWRG6V0s6paU29U1G:rIoHv7ohA4hOAnjXV0s6paOG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2288 msedge.exe 2288 msedge.exe 3052 msedge.exe 3052 msedge.exe 4744 identity_helper.exe 4744 identity_helper.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2800 3052 msedge.exe 83 PID 3052 wrote to memory of 2800 3052 msedge.exe 83 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 4736 3052 msedge.exe 84 PID 3052 wrote to memory of 2288 3052 msedge.exe 85 PID 3052 wrote to memory of 2288 3052 msedge.exe 85 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86 PID 3052 wrote to memory of 1540 3052 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2bd04cc2bae297118f40cd7b32739f86_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdadfc46f8,0x7ffdadfc4708,0x7ffdadfc47182⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6172 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5180411706863622444,9018551392703801281,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5576 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5dbb3f2b985caeb3a340f265274f62450
SHA17472caf4854421bbd46403775500e630abdbdc34
SHA2565a2f38783eba4a3a5d7520e4f54bae7e1aab72fd402787666df579761f205bc4
SHA5122d1c645852cb539f178d34190afa8001b8b69075107a3766c413b51cfb708b5a19aa15079382028f1d7c90f0549511334940d3fb62243281dae8de2facb9ddf6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5a000f8649c1b293dd132d38289a65dae
SHA15577b64a93918d98013c0caed44edef0628a4a4e
SHA256b137160729adcc3cb24691268649721f5217d7c990243b50214c28736cf70182
SHA5127a32ea3cc24835430170f78c6bb723918c391c45910d98aaf8112c4457bcadcf550eddf4c923e1cc76397c18405b8df8423c75547e4c21d6f85b19041d841beb
-
Filesize
1KB
MD507d6e9b106bda69fe710b6a0d0a88559
SHA115d5b8cc9a46829b609fea655d790867b28b3569
SHA25606e0ac929a34d75d51fd5033e003ffa628f483a7b31a71e91e62e711df4d1eeb
SHA512c58559ecc1989029679f9e8730ed35589e9fe9c430222eca04033dd6c5a9b4059cf6c503b24184cdd75ea9718be940c4fe337ae2907af78ad34c783b5b89edfa
-
Filesize
5KB
MD5ee6b484e4623919286f329c06a5da7ca
SHA10e11916f93d96550d0f9b9058b9ab12825b7ed34
SHA256d729982b3316b7d55ee4642a2d208191c0239e1db474f258e03e5978fb45942e
SHA5127a62fca5ac57ab6c68d73ac1e26775ae3f50a57ed6747b2d71d11b2db14ea422d43104602a45c0454a15d320aa2990c35b50c9a623f062bfb620247c618826ee
-
Filesize
6KB
MD5eebc4e2124a2f53022f08241f8e5394a
SHA14ff919908744f00ffb97f0a74be62c6861a4fd0f
SHA2564ed0fe8783a87d2493446401f11f1369d13a69089f740b4327229f99f56c123f
SHA5125f68b38ae343b794ff440b66e538d4201b18da1b059e510229e1c4ce099909c435b27b7f8df12662f22456de6a44bb7301eeb334022e5e28618bb0378ba42637
-
Filesize
6KB
MD520d2cfa9eba11f593bce13ae495de292
SHA1830a318c0fc21f5fe921f5bc61c85a5ccd8a1d4f
SHA256262335a8d0d8f98837245eb3d623d2e08b53e6f7eccf445c4f862cd91c20d1f1
SHA5128ac12349228279faf2a28c0e43836f7b79b8fe6046ae3c198bbe7554f5285e41df219c8318cd0814223cc4da65829b90e47a48e5925108017bf6750811bd0ec5
-
Filesize
6KB
MD5b2331f080a60ac2b6fe97c99fee10949
SHA16fe5444497f50b795371528a9865cfbfa3fdee55
SHA25656be2b44614a046031c14bf1327dad29b5c2752e5e5c67d2c1529ad845e727a0
SHA512420247867ab0569b092c4aa9d251390557a331584356115ca834ac5761f0f0e30d2d8e2bfd0bf79416e83a32bd0a978794f9a38cd28d3a730a69a827d8aaecb3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e2067e09b3620041a3db1e7b3aa45f7c
SHA1796322a61f90ed83712eb620de0bbfda2e1406ad
SHA25656604fd2bda5ed8d168816aa7219957c26561f9c67fa663311b320e6a54c8b9e
SHA512755db9459b23b4173a83e6449c78aeaf42af9ed3c441a0b61e18e8a1c29f50ae04a6df6a691f04d390f030a1e57054cd87577d7d6abb37338482331590db3813