Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 23:49
Static task
static1
Behavioral task
behavioral1
Sample
3d15e29b97b7b847626bc3939f7f2666_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3d15e29b97b7b847626bc3939f7f2666_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3d15e29b97b7b847626bc3939f7f2666_JaffaCakes118.html
-
Size
78KB
-
MD5
3d15e29b97b7b847626bc3939f7f2666
-
SHA1
7cf02e96be5a9997d0fdf06de0ae61fe105f1af4
-
SHA256
0ac4a7cb97d274afc5955cda077579d5ca526d5b5ace26669f4407b27e915473
-
SHA512
d19c283fca023db23eca4b9079e14a1ca8737ed21ef92744debb468e740f6aec93e3fd4f4a1a6af6912c3d480cfd8106cad7c537e4e211d156b21aafc32e4846
-
SSDEEP
1536:NnlvElSsV2DVTbUnzw14qVUDDkf0yV7bio+7FVP7c9LrPHDtYYzrdp:NnlQSsIDVPozwayxio+7zo7Kirdp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 3992 msedge.exe 3992 msedge.exe 3668 identity_helper.exe 3668 identity_helper.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3992 wrote to memory of 1884 3992 msedge.exe 81 PID 3992 wrote to memory of 1884 3992 msedge.exe 81 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4844 3992 msedge.exe 82 PID 3992 wrote to memory of 4996 3992 msedge.exe 83 PID 3992 wrote to memory of 4996 3992 msedge.exe 83 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84 PID 3992 wrote to memory of 3472 3992 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3d15e29b97b7b847626bc3939f7f2666_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8cf6a46f8,0x7ff8cf6a4708,0x7ff8cf6a47182⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3204 /prefetch:82⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2340 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,16650322875061903855,3857685536293315814,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5424 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
64KB
MD563e5a0b45632b3dde3694ffcaf0e3f7a
SHA1923736d0cdc308331d5cfaa0ea159bfedc83d53f
SHA256889109910477919b3457416e7764bcd0add19fd959848253026125c7c35c43db
SHA5125b886c4b5122d61f0209ede748aa84445c9388cf38813316c41b3dbd2308216e88394d9a45cfc27113c0cf3bc93b9c37d808f6d3c67888244c176ee095d42259
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5ce0e5485207115767ec888d7ebbfb2cf
SHA105f34a69fdddf96f13fa1a1948a8854871b2d08c
SHA2561b2d0a987d39283604e615dc316702bae30de0b0535b65e8ced9e334749b7ad9
SHA512698282a08dee816fa706066478e96da39c6359b4dd47453cfd0e76632f26bf26dbcae39e64a8de20f7cc19e97d23d59c2fa766d6d4040984f2a56c77ea365f93
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5c35ccfdcf17b0e23c48e41f9e64c4cff
SHA1dfdc3d35254ea70c2d2ef45b06b4716c890313f2
SHA256eb98f2abe0336997977763e03984b33bb1e77a1a340245690802ec2d3a2fbed4
SHA51285ed9a4fabd0aefcd86abffb0a1714f298fa4d79a324d47c83866e25a08f2554a4fde0b287651d92b065c3ff3a6cbb3bf534711076a79216bdd6c4e3e73d1c96
-
Filesize
2KB
MD520fb287d0d361dffb044001a6c0f8322
SHA1cd1bcacacf4f87dc002ce7d7b2683642c0ebc12d
SHA256f42f388db8c524ebf9e2b9282acf298b20de4774f093a28bfc1e902c9cd412e5
SHA5128feb8099decbdb54177f7101192954cef4b77f6411762599346ffa61e49ea0564079626e2579ebc33d1c7263f5150bab2641182e317ce6fb688b1e80b197427a
-
Filesize
6KB
MD560c82fb4f24d225893aa7c496995e7b0
SHA12919a46e75f9a78bbe69cadb28450fbcb121c0c8
SHA256b622393e4200da850e27f523803b93cd13190a751954a9f7225fc227f6d67555
SHA5126d1b6ab8ded6e868686db7145f1d8c93e4a815cb5507451155ab0852a17532f62f8b38f113b4890fcd1b26b1998ec924ed57e99416967ab3dc19559c40812416
-
Filesize
7KB
MD5d250f75c5a1f11b1607178376be36ba0
SHA168289902b27dfb6695e388b0cb59542b74e7dd15
SHA256df978cbd02ec64d40326c401910e390ed7ed3193d41a45d6d34293df104d8da6
SHA5124855d56d92febf45707cb83467aea96c5343be82fc81c6afea6e724cf0c1b81109ca839e2f70d526c1f1e38704515660de89d034b55fca0ee4a01dd9ab88722f
-
Filesize
7KB
MD572a1885bae434782f841acfb122878cf
SHA1e452f70b45c3a6b8612f67beda5d19c1ed13fe98
SHA256af9fa82bb8dbe7f2b0257fdab379b65bb22c16bfd61f636a48eed84c4151f1f6
SHA512809c496d95198540f52e716156e7b826aa366cf6b6fe652d83d89df6db1b739370ce05d5874e5b910ebb54f4ff83fe8e598939ab7e28f34a3fea12c2334ae1ab
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5dbc0f92664fc8d1fca069ac6e8a00d18
SHA161819b63dd4ba6f9d3f7793509e9843304ddd2af
SHA256de0cb4fbd4dd91f3d179e27ae5a26cce23954346931cf328744c5eaeeb221772
SHA5121dac70f95efaf9818be4ec3be415eec3c6e047b4354efad54950fa95981190dfe80334a93cf12cd4e7815685b2001c0b5cfe6b48f3c4b66c0c6047a92c8cb83a