Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
6061bcb2c3be983f4d5da2d54c8a8cdf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6061bcb2c3be983f4d5da2d54c8a8cdf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6061bcb2c3be983f4d5da2d54c8a8cdf_JaffaCakes118.html
-
Size
30KB
-
MD5
6061bcb2c3be983f4d5da2d54c8a8cdf
-
SHA1
bdfe0f68303bce672b0bfe8f271ad93ad96f76c2
-
SHA256
7d972e1f70a048b2d313fe697e06c5134179a0b01d2a8ffb06e1af15877896fd
-
SHA512
572873337b7b1347c9ac8b2884765b81a7560770acd2137e3e4ce090b9646f75beb9280f764f4029bc358308fe43c246673e85a67515088991cb1f1237568d54
-
SSDEEP
384:SI1fPrirorU9af6jIBT92IDqj21Gid7zrpxf/wdRUbXkaP9NSb/y+3wemQFYM:S8+srU9tjIZ92DkDnfkISb/y+AZQFr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 656 msedge.exe 656 msedge.exe 3904 identity_helper.exe 3904 identity_helper.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 656 wrote to memory of 2584 656 msedge.exe 82 PID 656 wrote to memory of 2584 656 msedge.exe 82 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1932 656 msedge.exe 83 PID 656 wrote to memory of 1736 656 msedge.exe 84 PID 656 wrote to memory of 1736 656 msedge.exe 84 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85 PID 656 wrote to memory of 2984 656 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6061bcb2c3be983f4d5da2d54c8a8cdf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0f1e46f8,0x7ffa0f1e4708,0x7ffa0f1e47182⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6820 /prefetch:82⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11244483677081710720,13294110820721698915,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD56669283e098530b155ce8d14baf2bc88
SHA19347f8c03b2351af3102ba1b552b817828e22ed3
SHA2566892d396bd0c504da49211312380384bf66efcd9930294f0774d55bd727821a2
SHA51293a9e480f3bd12f325230ec0b1af6f061584885c6aa280fdbd87b746d9cc800415419f34a8b56b98f2a2d54384fa78fb363162f04a09619cf9c2642c3ac2de33
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD530056393bff38c8f65ee5a732e17cedd
SHA14891ff9db17f185b79f59332b5caeeaf6ad8ddda
SHA256067e77e4ae65b823b8073b55acb36d31d096faf68d96dc61bc98bbe347226273
SHA512d240abedd4a826b24437ace513657ccfb7f39a6a8c09423cfd871965df29059692e23308acbb6f3cfb45be6698daf142b07a6c110dcf2c2e51299bea06e7945d
-
Filesize
1KB
MD517e1aa0796b37c0a8f821193811c3a64
SHA15a3ae53c2f3788188a0ce57c20231a84970bfe32
SHA2569038a06996787c13f0e3a97edf848c4c53f9bf6098cd0621696bcd83d8beb6c3
SHA51292f11546cfdbaee605b69ce172effc56d8d1ace392c458643e408a7302de6211028257e8fec7081bfae6a5b72f2b4d22ab033b0d7a873852a1050b9b0787c093
-
Filesize
1KB
MD50d3d7aa0d60ac81a74fd60c6d03e2ebc
SHA1c39ca42904dbedb765a1412f1681bdd636425a4b
SHA256729ff5bb8d71c1897ea46673b797990b521086c02d2ba20aa2a6466d809355c5
SHA512968b14a3ed68c651d9387948b020ce87e44af5b992200dc9068d74370cc7b54bd0bea34990e558ac78a86d756125d611ca0d7b25551625143da10589a377afa9
-
Filesize
5KB
MD5657ec3b521277df2e0099cf333285272
SHA1ac5823c180380c85e849d9105ec3866ac8d555b1
SHA256adf50ae204540abc26b9796cb0724a7343e848c5d4a9e396a032d2d2b5894704
SHA51274c128ab92e16ec60204bad3a4d2313c33b536980a4d29a536855917ab05ae0dc4cbdcd1bed4511f6dc893c8833ca13d7dd151482cd69863dfd90cde4f77e7ab
-
Filesize
7KB
MD5245a994ae5fefecd7eaec1c5482b545a
SHA1f2c649feedd3427bbad038f3838425cc20760674
SHA256c8a0fa09665dfbc80f83f02c93b3fa8d0b2abbed3af05339942b9cf2452e6e69
SHA51226651a12c926874bc88b0b84b41dc3ce181a7a718558282a760d90acde65e6b134dbab23b514250d5f093379ba9814dd01c4bcbd95a4860d5d1ed41e682330ba
-
Filesize
7KB
MD58069b2961b01e35fd6aecbabe57785f0
SHA19f7bf9a325790ad15cd23bcd49e2368209b40b28
SHA2564b38364de33c651dacdb65a014ca3d8154ac9e598b599ae65fdb3bc00a0c6752
SHA512a0025c15952c538511dd03a961d4531dfde24a0180942e90503391977010a7c11e2c165de879c87c8121faf417613f5dae1a42ccec0edcb413e7813360e3802e
-
Filesize
7KB
MD58802b86ba89e3e8aa55b4a05f67db8f0
SHA14ae76b807b608b7365439322073deba972993249
SHA256733c3476dfdb4e241c97e863ffc814876644fc86c61e5cf932340afc97ae6a1f
SHA5127fa7966041e308b7b9be617e1bfb9ba045083041a7b7c181120147503075541bb4cadde59a9fee784144d788f2fde296273c59b6c8466658fe546b2e22c13548
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55071883f6e52a504aa36a2354253891e
SHA107ff8febdfbc8f1cb97b94556e70bf0cd973e64b
SHA25609704d2487738efbe681b3cc04c9a3e1dbe1a3a6c8e25add546a9d3c00b1ff5a
SHA512e37feeaf3f3953d48286ef2fb471a57d81d6300217c416cb596def69bc80a83aa5ceefb364a72210838b407a61d29a7a178d10ad0e8d4d58f815955da7a9bcd1