Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 09:08
Static task
static1
Behavioral task
behavioral1
Sample
4f4b197a659fbbe0ee00c72ecdf167c9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4f4b197a659fbbe0ee00c72ecdf167c9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4f4b197a659fbbe0ee00c72ecdf167c9_JaffaCakes118.html
-
Size
85KB
-
MD5
4f4b197a659fbbe0ee00c72ecdf167c9
-
SHA1
928ec95ea2153ef24aa0ab7042562d31e856fc41
-
SHA256
7a970e1a4242aa14cf21ca4c95800617e5a6830f85f9a140cd918724177c3bb5
-
SHA512
aafae7b0070fae27299e6c04544f0366d90332dae7569161c383923387600b4424b13956054e8a281d8304bf17707b0e6007d3489572dc93357ab627989855bd
-
SSDEEP
1536:/I0NfdpuAP8VZsLvJXWoGOYo569Hiexy+77MNva:/Ic2AP8VZsbJm2Yo569Hiexy+77F
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1456 msedge.exe 1456 msedge.exe 1692 msedge.exe 1692 msedge.exe 3744 identity_helper.exe 3744 identity_helper.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2280 1692 msedge.exe 82 PID 1692 wrote to memory of 2280 1692 msedge.exe 82 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1932 1692 msedge.exe 83 PID 1692 wrote to memory of 1456 1692 msedge.exe 84 PID 1692 wrote to memory of 1456 1692 msedge.exe 84 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85 PID 1692 wrote to memory of 2708 1692 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4f4b197a659fbbe0ee00c72ecdf167c9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5ce246f8,0x7ffa5ce24708,0x7ffa5ce247182⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6892 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6884 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6524 /prefetch:82⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2820 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6148 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4656913977273218625,12242249372763980277,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5951e75dd16d857d49d0b33f410bbd96a
SHA1b81887770e770a9f637e8a15320a89e261fc0d34
SHA256cac4fbe9513b51b335f830f20b8047818a2a75c027e73d5d7a53a24d0faa29a7
SHA5123212cdf7d9409b0ddb3831cce80c99c04b69a7bd408e065b351dd8ff66079a172cd6e41dc898f5c439ad59bfc74613125cbb1f84a2a72e78935c89f63819654a
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
911B
MD576861e944c77619c08667a55c0fefaa0
SHA1b2b76e0b20522aca46bee061657db8c2d5c4e360
SHA256585520cc0357ea236ca66ab19de3e3286e38e07e0a61ccc99c85a5a31dcadbfd
SHA5120ae0dd6a6512ede8da112164023ffa0744520d7c375ba0653745c2887c954e288b354947fbb299380ac569babbcf23e2b784f34b9c78122cdcbc4abd864e96c4
-
Filesize
1KB
MD5aaa53b01fe56a983bd5889a338b7d67e
SHA1260a5db745f5c97303e51483e5ba6672ecf7bf7d
SHA25647f37b2dacd93eeb3a5f3face76dc41fc618b9b18bd49bf60203e3211da65d9a
SHA512e9db48c4b2294cfc4180364cdb520e58a4610c8208fcb9b00c65698b117b8e5a7cbf3dc41cf821e318477c159783ae9f9f0d682218a5868c7b4ed22b02404eb8
-
Filesize
5KB
MD53566cbbb7703a699f1461aaa1be3de66
SHA15e3373d9727e2dc08ab4c181b6fef1e13defc8c0
SHA256e7ee0a2268dd279149022c3176b797eb6ce724b907be241d1b8ff3bda73bf21b
SHA512c8c7c119973e29e5c8aa7f63d7c48478bd61ef78deba2969264f52487d43fd85b26af4d657932be2f29bc08f87d59ea75880751d4ada93b21d8ad3f7dfae4f75
-
Filesize
6KB
MD53c0d85f55106210ef489a7ebab544402
SHA1b72b59925b1b19747943e09de13871923705c306
SHA256fde7087bb316d51d3a7584aa6723e201b14bb0ddb63c17b565d57a11adb6866b
SHA5127c6d5b87fe69c1665c57121738d88791ab8080f2fdbb65a159345534e7b69eec51d15a86494b77aee044214cb8dbd2303a0fea838b8845966aa19876cbf8d827
-
Filesize
6KB
MD5e9fc80c6a700681396fc0fbc189e1cb5
SHA12c9797140a5717b10c04d7a706d1f3edacf351dc
SHA25600af676fcb411bcb8165b7902ba5f56d1ba161f4e3fb4e417d0d49d41b617c6f
SHA512d641ac71fd21b6af80d0d7f961e116c70f9ca3af39e213fc387cfa3ceb3561b4618a14a6e60e8532deceb6024e4ef87f41c2f935d2f728b3993bab031fc2e777
-
Filesize
537B
MD526f082daa85c6618b1ab78220ab9c17d
SHA1c47607242d65e3cfb9608fcf09f07f84c3e9d151
SHA256966c38cc2e9faf4452e14631d3fe219e926199cad60093e154738dcc52110fa5
SHA512773f10af92980391af6629f353799216d2ed6b730a1219b9dca30b242a3a1479609f01d5a1eb87fc7ca5fce2a3a38276ddb0488a0cccdbead6054c9d01a0997c
-
Filesize
537B
MD57837bff3146b03142f9f8c8ef053cd61
SHA1195cd4ce7d99ccab8c45d40c75fb7b9e6ea3cd78
SHA256f30700a9daf62a4debdc1770fb90b78ed19cc3d016ff155f2340ab05da1317a8
SHA5127e604d7df5d20318ea34fab9bda59f87e7b4e12b474da54c6401289c1f92d49d6920af39fe99be75c0c54c9e758c45f1974bbcb696b56b0bd976b31998d37d69
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5653ba1aa37ca0d15be20a3e8a52e26b1
SHA199bb6ae0aae84d50ebf666e376896685d92bb617
SHA256df0be46f2774eafb6b12b13d80889172d66ae5b257ae84ed4d6737f48c7eb7ed
SHA51295d5438d9b1433e8e1323b2cf830606e26f623cafa8c1585610ba188455ee97804d19d9cb22415d26a41f3fbb478922e7bcd37ed1cf56e310df4eca203a1fc24