Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
5f66db1a4ae6d32247801d7d930bdf2e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5f66db1a4ae6d32247801d7d930bdf2e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5f66db1a4ae6d32247801d7d930bdf2e_JaffaCakes118.html
-
Size
50KB
-
MD5
5f66db1a4ae6d32247801d7d930bdf2e
-
SHA1
237aa1d7ecd180c17a6f0b8ba75f2b08e7ee0c2d
-
SHA256
08557653cf7e98e022f90c355905d05d63eaf5a69bcea9318832a1d002469b11
-
SHA512
96aacb9093f21c061b79733c5740a495d4f779cee2f8bedcb80f98251dafbd5b3a7a8f277268eaa188a95be4118191bcd6b432c596664c32efad33d915a0761a
-
SSDEEP
1536:SPsYPvd5JlWzgz1zSzrzQz3zazxzQz5ziz/zjz6zYzLzjznzHzfLwv9e2QcNqK5b:SPN2sJYUx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 3108 msedge.exe 3108 msedge.exe 208 identity_helper.exe 208 identity_helper.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3108 wrote to memory of 4496 3108 msedge.exe 82 PID 3108 wrote to memory of 4496 3108 msedge.exe 82 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 2288 3108 msedge.exe 83 PID 3108 wrote to memory of 4884 3108 msedge.exe 84 PID 3108 wrote to memory of 4884 3108 msedge.exe 84 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85 PID 3108 wrote to memory of 1232 3108 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5f66db1a4ae6d32247801d7d930bdf2e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd08d146f8,0x7ffd08d14708,0x7ffd08d147182⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6468 /prefetch:82⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,398461232658830436,13096625356709723874,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5a3711cc57501c971766c0f02f8c8012c
SHA125c928951aaf8ef04996dd99f0b0ea39b65f3e82
SHA256caec014759ddbc7e5e2016686836999f879d79881acffac93d7e887e64c96b4b
SHA512d56b05c458e14954989af040c14c6db0d60408b9a66a77d8e5b1cb67a1db9dfb9336edb5348c578184625b90f474f5557cad816810dcd65d12b1cd0400092cea
-
Filesize
1KB
MD5ad8b014759b77bbc0aea629d30c32c35
SHA18c5aa9bf664f2d323467fe9f58e055e5e4f8b7a0
SHA2562abe7c696d18d9a57e24af693a7bc0cf8db59a4df56b52e0e6ee3237fca3a078
SHA512a6207f45e5f0330565489a618508763cc8e0562e8615463fea0e90480a36c3125f9f0bcd6cc54aa638206d48826e2eb5ff34eee63df36dd71f9aca80bb108500
-
Filesize
2KB
MD5e9deced54d9a60d7f3bc2145ef9cc96e
SHA13946863898d62425d06c8a7e57c3887e66dd6df5
SHA2569c3cba4d9727600bd8256024cbd49285772a878ca68a483f0c8bbe3cd9f481af
SHA512c7ca415c08a13eb6f90ad34308fad653fc6792d7e3250b671f7b1c7775d4f1fdcef84bd2fd95f357e6339d77fe19db6639a5efe845ef24f47bc0d5e047813586
-
Filesize
5KB
MD55694f7cb09e7dfad77878136d63802db
SHA144a1ab739f0194d9345d1e9d4610790e23db2d67
SHA256e63072af09a395bf85b3cc669664da1477620c69328ec4515c2789d79acd46e2
SHA512fa31ff3e0c444e52f64cca7dd88ec97cf1bd056394c4dc5d5166c18f4ef205cd17a81a8181b546e007f3813183057dd47b1ed8382920f619e7295ab56129fb2a
-
Filesize
6KB
MD53f271d53f07253e6c80b087a95e4b395
SHA14078f1b85ea2ce8a71d26989d9e46e3937b6e412
SHA256b4ac39db2f031b404d68f097adc8ab39a43d8bbecdb9b8b75fe5784c6a70d40b
SHA5122c12720b472a8d359c798ab0ba02889d7ad5ee46b15779e8dca1d27491a0a83589f74fb31ccd3d7fe404908227183e5bdada45dce756f856cb10ee66ee4c20bc
-
Filesize
8KB
MD5cd132671f08093a39d0ea997110310fd
SHA1a50dd96b851c754fc85307ef54fc8d258c180836
SHA256b47eccae84558ce0eaa2b7be2becd5511a896d6d3794e16f792383dccfcbdf35
SHA51213d54d76fe10736d9ce7d7e42d333603dc001f46815cb5c97279043dcd5085df33559eaaa527d5e28e912d8541ec8e1c691ea9c182eefde845c3485e97bd773f
-
Filesize
875B
MD51cb22b7199e5e9a3b8e2ffbfff9f740f
SHA15e1d1c72a0790ad292f5ed92be67b6017dddea12
SHA25634afddd008517618cb5baccf481a8618198e5fdc2e89793fea479df0c4f84188
SHA512aecd073f61a45bc027d5fe5a608c032869809e2717f1e337fe967854dfa21475d1c11d0c25d587cb249a630cbdf0658901b6503a9587073f75bb3ef3a441df87
-
Filesize
707B
MD5e112d37de696462f469b4bee1240db1e
SHA1223be45fcee5b37db51cec06a8b35b581f912e8c
SHA256c8b32c4e5cf37b22a9f8666702f5252946aa56d1e8337db51ae82b5cf66862c2
SHA512755bf2b381df21a124c533f791b7a03cda3d653aabbfe1ff2820b9ac76783670228351254ec9927a40f942dfb27cbb6002aa11535ed3475f15d0167cf22b2410
-
Filesize
371B
MD5711a53f5209daaeaac8e019ef0976752
SHA13d8249934dce09c326de6b236795c1c944afb4d4
SHA2567afcf8c72adf584a65279e003ca9062678f9e8644c480156fe427d2cfafe9a33
SHA5128d9c2ca0db841ea9a1ccd62345223f4bc2c96fc6993d5e6a01ee000efe5c5a3432bf4b5e78d9fbfa7bac144453df4fa5a7d8a9aa7351180fa218cce2a214af85
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c67688bc935e63038cb01d3a0b954dc2
SHA1e72e67cc809152f61641095d79bfd9e1cf3a334e
SHA2569f9de3495ef5955f7fca8bac9a69608912bef4f65242e2a6f1c5e98880562511
SHA512a48b6db530122ade8c63bb9982b182f1d7462f566f2bc20373d3e5fdc82805fbea57e2342d662f2229abdc2a1e65adf60cc09dc2a63429ed8f6f89e55c74e9b0