Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
62a88f6aa3d6505b08a89ca7c3e94c55_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
62a88f6aa3d6505b08a89ca7c3e94c55_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
62a88f6aa3d6505b08a89ca7c3e94c55_JaffaCakes118.html
-
Size
124KB
-
MD5
62a88f6aa3d6505b08a89ca7c3e94c55
-
SHA1
d356a92d64db914c6ed897c1ec85afc35860f7ff
-
SHA256
592d866a73245474e5e020028ad48517eac78a1cb4a1e1fa69e0a3a8f624aa9d
-
SHA512
ed9bef0897ecf5b8afe4fc347f3ffd07009944916dd50eaca5cfcd3b290eab8fb220d066bcd69c73dd1d09d2f52381a8c68df579a04909c79d91732ae1221ba1
-
SSDEEP
3072:xRk8zzZUvAropm8ehAVq7U3+AoUQqcUdcZHqDIoqCnCtzXeQC1lcgqOreAmM24pm:xaFeBqDBfnCtzXpC1lDcj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 1224 msedge.exe 1224 msedge.exe 376 identity_helper.exe 376 identity_helper.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2920 1224 msedge.exe 83 PID 1224 wrote to memory of 2920 1224 msedge.exe 83 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4604 1224 msedge.exe 84 PID 1224 wrote to memory of 4836 1224 msedge.exe 85 PID 1224 wrote to memory of 4836 1224 msedge.exe 85 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86 PID 1224 wrote to memory of 3252 1224 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\62a88f6aa3d6505b08a89ca7c3e94c55_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9849246f8,0x7ff984924708,0x7ff9849247182⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,14994516166843530309,10974484658074773377,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,14994516166843530309,10974484658074773377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,14994516166843530309,10974484658074773377,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14994516166843530309,10974484658074773377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14994516166843530309,10974484658074773377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14994516166843530309,10974484658074773377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14994516166843530309,10974484658074773377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14994516166843530309,10974484658074773377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2164 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14994516166843530309,10974484658074773377,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1256 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,14994516166843530309,10974484658074773377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,14994516166843530309,10974484658074773377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14994516166843530309,10974484658074773377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14994516166843530309,10974484658074773377,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,14994516166843530309,10974484658074773377,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:412
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:1068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5aa7b8fb70d9fb0229a296bb01ad8e239
SHA1b06dfd443bb252ac1e49af35a20e20f9d0fa9597
SHA2565450414e3f2eb946e104d5cda416db2742a089ecd65b8351b108316fa63dd15d
SHA5120643a048679e1c0af5e3920bbf03f93416ef8f6209fb58ac9724183a22f1d4805eda87f0b3250b910afea5f09d378e540273341110cc6aa6d9b0276d97dd321c
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5d908e27e22ff96f916a4887cdc0fbe40
SHA139e5d5b5642d28bcbdad144aeb54644199f26e28
SHA25685d28292aaf8780e7a5f1574c03acdc434a189f390a44113983b65bfdd9718ef
SHA5129b5df4a1c93853b7878e32e826d3b4d73ecee61020ab8504734b6a264c40034c0dd2446ee6af12cca0955c96e87ff310e1b246fd8f7be981319a9d9c783b981f
-
Filesize
1KB
MD58d5e45d347857745899bbb72879fa252
SHA14d4b1a03f87f94d35fa9dafcc64f5e56c9c51224
SHA2562f1186048599115d8d5453ad3b5869eaa4f7a0f23e2f9ae180c5f60f7bc4d5ea
SHA5125bccaea555c4b42badf7a8fda2ca8b4cab28182238ea2a33edd630581396c43d90dbea40c8faffd6ce31a20354fab3a7f0801087b0966916a46ad4d1a1a4b173
-
Filesize
1KB
MD552cf6dd00a5c8314e5b9aacbac537055
SHA1d8c4ad4c127d91896f43c5c7d9bb8902ccc6402a
SHA25641ec51602fa2fe4b9d3c13b8bb60b924649b74e26598aa8eb8d14b7355a8bcce
SHA512f0525741e2845b18c8bb0096739fa187ae87cf080b9ef0ddbd358017906650a5af513263b835f54e7127b10aa1ae1668ad229b43c422fc86451bb987a1e5396f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5214616151fcf55dd5ec268e4be2949bc
SHA123febb5f95673f966944847644c9b73aff621550
SHA256fffbea02b8512acfa709b50f056c04a5ae6d4bf313fceac49c3f58e2106de441
SHA5129a29194895e7e7b6c8da1bc82fe655542f09250f9338e31b2bfca6fd4888c916530fd93aec35bae328c549f98608503312cbe1b4954fcb8f21a7a0de96a91c4c
-
Filesize
6KB
MD502db439f712d718639a615856cf3d564
SHA1fc35a190590e93b16702474371b6a6da33a0e66a
SHA256742c1448ccdc959b0b336bdad0d2b1c646f083909532d8f7a2b9534d2319c380
SHA512bd747a012f5da80b7b276e37744e63924545959e2fe788a9e6055e10154a4c3f1dcf25ccf3b1e39bafc0c48226699cef155ed62c0bf867197801780a662f52e1
-
Filesize
6KB
MD54b1175f756f02e739781257b980e9f75
SHA15f73943acad43434d7136fc8044d66d3ffd777c3
SHA256176b60e0aff5784f5bbdf96cae319550f984adb8758304af48bfd1f02c4f2eb4
SHA51223146338672763df4f391b35552908a997c85578b381eb6152d9393af60f2aaba59d41bac6373c277cfd1fb3b976a4fa67614d2f5ef843355fbfac0141984d2e
-
Filesize
539B
MD5fccf45c3400183922f569f07ec9128da
SHA15f21f46234c93bb17e1099ec600f0ded46c073e4
SHA256514f781dc29df6b75c15c7cd642d3fd0a78cea247634246f69c94e22e9701575
SHA512bd9c36ca03f50ab8155fb89fbfc933516f18121b9abf3e6d0051424c3f924d30ac5eb2c1fca2693600b2dfaffe0cca3309bf5ed1a348f1958d67515720681c13
-
Filesize
371B
MD5f10077cacd99210fcc44a9b21f497365
SHA14fbad5e211390157a159c49f7575391a5b7c6ac9
SHA256160e51ce75e8b3467351a7f3e777ca03bbc3b25f2f69e16007a990687f54a914
SHA5125746fd3ebfd3e74347baf62c4bfa82063ae2204c7aff42fa08b8f5aa70e02ed429321834a2b2f9db08d5a86d10f0e6e3ad4909ee38ae985361bbe5e4593f9ae5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cbe51ae408e7aecee711d0575c6dd8a0
SHA191f35147b11fe1a606a5c80d928e93ac336b36da
SHA256b81fc9474b7304db6e5720651e761b6dee296f00e9b38bbc0b91e2f7b75c8b08
SHA5129f07d0036f7fbeb6f6bb3053a9c06fa708bc463d5290360d6f022e63421da0428de93c7070352ddcd68ec23b50fd2636d240cac8d4e5d2d1db75a49a3c96fc1b