Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
44b38355ee8aac9592a0d90e805a05f3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
44b38355ee8aac9592a0d90e805a05f3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
44b38355ee8aac9592a0d90e805a05f3_JaffaCakes118.html
-
Size
29KB
-
MD5
44b38355ee8aac9592a0d90e805a05f3
-
SHA1
bc28c968a0523d2fffbaeadd8c7028d11cf75a39
-
SHA256
0536188b1075612368ee74e001654caecf58969062f4c6828560e0b5207db5b3
-
SHA512
a958e9ce5b23524d64196290aa888a189ce53ae918705c1405650b5412f3ec116f679bb58a57a3a0724af5144eda12d928fd4b73f58fed4dc7519f632e690378
-
SSDEEP
768:Qnod+0Edi4xs16A7g2y0HCcNSjWfFeycPt/BcEeQkpvX9:Qni+0Edi4xs16A7g2y0HCcNSjMIycPtY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1536 msedge.exe 1536 msedge.exe 1172 msedge.exe 1172 msedge.exe 1728 identity_helper.exe 1728 identity_helper.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1172 wrote to memory of 468 1172 msedge.exe 82 PID 1172 wrote to memory of 468 1172 msedge.exe 82 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 116 1172 msedge.exe 83 PID 1172 wrote to memory of 1536 1172 msedge.exe 84 PID 1172 wrote to memory of 1536 1172 msedge.exe 84 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85 PID 1172 wrote to memory of 1320 1172 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44b38355ee8aac9592a0d90e805a05f3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff12b746f8,0x7fff12b74708,0x7fff12b747182⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,4370280064193928342,14173166190675805467,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5eccdae7798e56229150cd64d99c4c980
SHA128e93f41606434268050b338b15424195cb1130a
SHA25606df4d128b5ff943faa4fc3a5fe1e3271de94fd9abde80126831a4bf574f65e3
SHA512f917c7fba4b071324d08e3aae6c5ba1e1be1cb481211664c9673deb50d808182f8458a35fbf6fbd868f5f3f12042c53e28cf291937b1d726fd73e1f58a148b91
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5d39fa19730c12c4722fd41767d21ffe7
SHA17b0bf4db656793976b40fd0e52e3f76005a86529
SHA2569102d0be02b08fac1fb2f7f5beb78e344daeacc5f994b9ed76fa3950a5fd98cf
SHA5126b9dc76f1578248da508167f83595ca8f83688bb79372b07ae85143925f0cbe9b3f55bfd8825d882e2100b21e7b4c8be4d6d695ba98acabd449a7d87d1db7466
-
Filesize
1KB
MD54621a9a0efa5a5a379ddbd6f3655c9ff
SHA1ac48e4abf58b6875850a5e3a92d87fc02165785f
SHA256299eb04ce9840c33da484019c8e3682dea8001e553d8e0af3bcbffd2ad5d7b44
SHA5122479fe63bb0e70ceee151bf493a001d65122122096e8a3a9c48090803004810280c1cfaf5a148e58aa52031ab14cd65ec7bba74a590fc662266f76af823c79ec
-
Filesize
6KB
MD5f40731deb0ab523c66c5af7be5809a23
SHA15f639c8512d1e0dd8936d86da95e66a19f075b6a
SHA256923d53e08829bdced4ad5d872e3cafde4ae1e8f15c042f7a08dee12e996aa489
SHA512338dc5d0bf3788211be32fc8624c8416f7e845053f8e638f5016a14783cdc0f33faba0b7786d40a3bee0ba9d02810eb9de57e8a6cb0fd2f6338fbae2303984a7
-
Filesize
6KB
MD5d477bb1067d6ebdfdf01a4cab1656e89
SHA13666d35529404c6c7caa5a45d6417c5d37bb4186
SHA256c7489b0155a5a4575e2ab5549a2e7d65193fbcafbd39fc75f6d1128f5600521d
SHA5120dc2d1d89d6096e94da9cf33ee1029a331216a492fdfc4140d0905237cdf62780735539162d77f59ee14b886bf7f20c693fc4d69ec003b5d900f36fab540c7b6
-
Filesize
7KB
MD5d8c673504aab20d96f06e1a6ddf262d9
SHA147149fe9f069805009810b33d98d2d04958c8578
SHA256a3d2ba7c31781d6fccd933648f09df009600aa7d060e0c31f59725d7aa17a6d6
SHA5124255f4ce11733130391180bae226b8b3aa129f024e42bf1d5649a17c2384aadec53afb6ff364f4b1f0476ed9d720a58cf5bc73e0463eb8eabb08925f0c82c9c3
-
Filesize
7KB
MD51ba883a6257557eff992fe486199ae2e
SHA137f7886fa14b373a046d89739fb166c0e707b234
SHA256b8c9a197c78c371ed717cfdc10e8a6f0f8d02fe018efa4bcfc41e1e91493970a
SHA512fbc5eff1dc8b155eaff1d648d451fabf052acb5448614ac98dd8d61fb40b38bf6c19155293558b248851e8892a2536935bedced9503bbe897cf87aa45d4aac24
-
Filesize
706B
MD5beb46a4336c7fd243c3431cfc3c3bf68
SHA143abb24f92b4e54f4f912a3e5aed25a39516e902
SHA256bf748a17bdeac50132c0c72e19a58ca0b6a864d251f128bd18a063e23568dd4b
SHA512301642c170e7038a90c2470c71e924c714c44fe6d0efe6b5eb5c0077b724e982748eb540a37618c4b107f63eee7122379646922232cbf76ad88a81c6117f962a
-
Filesize
371B
MD5f08130f74c3f3fc39062fae4b3a9c0e6
SHA1ca86b85c06773b827e18813e0156947a85596169
SHA2566908e7bf336a1af68e2dde84b4ebe587390281f1f77c85bfcfc7a6a7aefb0e43
SHA512ba9188e5e2f506b4f799c24789767796cac6c32275beea9df2300f9dbcad8206f50a6e50d33f6026cdb2391cc044e1b65014a7fcce341441aa4a1bb8a6f2d0e7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5aa260c7788c7e8f3bf86fa02e628455c
SHA19199cd527ef38280c246a70f8cecf5b65b40a41e
SHA256b3ece995fd5001c30ce9d0acf8750c469cc1d41a93be793b42449656f970850e
SHA51213a0fb73256b305f54ff3f5958d5c521dff660addd3fdcbe7f782ddb5cc8eb41d3d5a64f11ee16276263fbc10f43bf244d161ce78059a154c2fe36a665add814