Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 10:04
Static task
static1
Behavioral task
behavioral1
Sample
4a88683b48ae0672ba92ca90269f3644_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4a88683b48ae0672ba92ca90269f3644_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4a88683b48ae0672ba92ca90269f3644_JaffaCakes118.html
-
Size
122KB
-
MD5
4a88683b48ae0672ba92ca90269f3644
-
SHA1
087eb69e9728c10b075775ca9a365980d58066ba
-
SHA256
eef53de4cded5195f2a015b8c38d67bd11a3d311fd9342ca6ab77c576e88db47
-
SHA512
1fe0ad19ea2846f88f039ffb7d661f545820e9ed3528b8aad27d467b5f8a436bfbf7eb34339ec510b788b7bd6656d9475221a8b1cc544085c0c182c3aeb6c958
-
SSDEEP
3072:plT3QQzgjwwY7M3vO4ebpTgn7hIqmBLygFBnuBlO:a6v
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4128 msedge.exe 4128 msedge.exe 4856 msedge.exe 4856 msedge.exe 3640 identity_helper.exe 3640 identity_helper.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4856 wrote to memory of 2032 4856 msedge.exe 82 PID 4856 wrote to memory of 2032 4856 msedge.exe 82 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4216 4856 msedge.exe 83 PID 4856 wrote to memory of 4128 4856 msedge.exe 84 PID 4856 wrote to memory of 4128 4856 msedge.exe 84 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85 PID 4856 wrote to memory of 4584 4856 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4a88683b48ae0672ba92ca90269f3644_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc840f46f8,0x7ffc840f4708,0x7ffc840f47182⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2124 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2572 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9416160080361265693,15405930669049667952,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5cc09bc3dfeb63d07de8f1a60cc789f9e
SHA1ed5a30f2656a25f6e97cc2b6b31ac125ffe8f079
SHA2561364e47e21a642d4f40ab2094e51e0abf7277bcaa4e8b57c1f099cd9c6948b0f
SHA512b4605d71acccf0832db8f46a37a1f8cc7630050059afaf4c3eb131f32008480a4dfdc3b4f4e53248c5edfe951e68cbd4b5fb0b07b24c14c952562305823ac25c
-
Filesize
1KB
MD5b9d352b713659ad4ecf912c5e9a7149b
SHA11a532106fe4b8a6ab80c5f20be72fc578c90b0d1
SHA256efe5f3170d2b6576482c5a008ef2122f71417013943737beae06d4c59edf9155
SHA512267f1c6edb75054adb092a2d4e7fb124ab491878cc3a54be4e089b56524bb9a5ed365915c08db2aa6a5ec7b1f9fe43db45249eb6860470deacf4e8b972b90fcc
-
Filesize
1KB
MD597eeff80b508302d1b53a19285158646
SHA164550333df33e9341f0f2c1ce9e1f8899904e9dc
SHA2563cb318251bba38f50e3392c625e7479200fa8d3214b6e22745732841d00c2d0f
SHA512b9d4ccb57beb7dfe1c9013e1ee4eaa5f714a14157775588220441a49adfba4f654a3750d103e9c506d5f0499049b53751326e925a74a9e6b2512847d26edfd40
-
Filesize
6KB
MD553d57749613aa63b2593d2d02ec5fe65
SHA155c5c50371d901059ca8b95c789de13bbefbbcb9
SHA2563311fe4e3bf4473ef8395d715f53852bc0a0feb6f2c42f05d7264b7ee8d9800a
SHA5126ed2138518b4cd463b2e36d21248b9baefea387013ec1875a2cbfb68eb72441d91042be590cbc4074ff131a5d11cde448a6a754f8060c8149b669069c92cdc3e
-
Filesize
5KB
MD55dcb98b3ebe4a2a74a15c071c0f4ddee
SHA173b2739bccae299b6a3b637a2f5bdb0e170d6c89
SHA256444eac5cfb6ea2e7d4115ef2d92251205736243da79a9457448f2aac06cab238
SHA512fab33a052754f2a9659cd5e2723278d5c5a9beabbd33a204d0229e2c75926e7e6f105edf76951977489c8a8f4f324990c5b36ffc37608b8ed1b7b9acd7269c5b
-
Filesize
7KB
MD502f30b9d3bb7b51c4b0a51797a7b8e69
SHA1ed30b17f6da674198e8c8c6fc5f0087ec6c79328
SHA256156587108d9b14e4e9ac13fc7d91348774d70e284d63c76fbcc5d28c52de16a1
SHA5125bf0ef4d24a16377304a7965766124ba978876af4a0ab0a85e6adf3ed333d8cee1d69e2897c372a86b71999ef909f12af229af77824c422ce03ebec44743b637
-
Filesize
203B
MD5d6956121fa935bce1b0d960fbe6d7f05
SHA1060852a0bcfa429aca6bcc7027e1c393095fba7a
SHA2563f168a0d5f7ea26f4725a417239f9d5c2635f3b71a034fd45821b4cb802fde74
SHA51221905d89ab8998939fec57dfb5ce90e3d41fac94a9348f960ff152321716db03a2795f783388196fa9d61732bfa57df3143dce2151180f677d04b121c41a62c8
-
Filesize
203B
MD58ed6c6ba73b8dc28268769375b6ccd86
SHA1ca00eb9db9e8c11d3db3c6fbbbbb43bf55063de6
SHA256944f4d4a099b35294ef9e15407d6b5a341dff153dd7e29b55b83e45a51b74368
SHA5123bb179734f4ff028f33e6197d18a0e17b3513dc9f079c556a0b5259308bd0faa104f711197fee514462ddd70feb9930b43cd9aabedb708b62f5b85343d0c4453
-
Filesize
203B
MD5c6cfac2e8f0ef1d7e68ebb384db5752c
SHA14e4035ccc84b05855cb2cc63d9d396ce57a2ad56
SHA2560900ee95a9375a70a1053218b02774793b070db73ff3806b46907de9a78afd9c
SHA512b9a29dd1eeec3180c9266460f6de8cb0fdef0792e53e23a0838eed72ddb28766561faf65b84168267d32d91544102db711f14cdc7a8ac53d0711ff02408128a5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e1fda994ac976804826984124d979726
SHA1975019bb1c58e399d805052cd39e74ee3c617e8e
SHA2560b8ab188c915dcbc3f46f86a4169fabb0b44a0aa9b72e94df287b9f7ac602c97
SHA512b01d29acbfb21624fdc57c8665107776380938e99055665045b190f6b280a3c7729f152f5e3d6968cfaf188f5e435e5a10e3139c7c7608b195d0fde85eecd289