Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
65917277eb65f2c3061f718abc911317_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65917277eb65f2c3061f718abc911317_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65917277eb65f2c3061f718abc911317_JaffaCakes118.html
-
Size
236KB
-
MD5
65917277eb65f2c3061f718abc911317
-
SHA1
321ac4c3f66b0de45200578ee5fb87b81966fe50
-
SHA256
7eb1788ac7c7647adbd1bf42b8497755c5e964a310bde3beb39f1d99ce33965d
-
SHA512
2d48858f04296cad27c18bf57f509d6ae74ce7cbba45b9a5565c65f6c381d01bfb78a29b924080d58794a55d2f91eb31cd2cccdee131ed088bbb08a1d28c667b
-
SSDEEP
6144:lLyBGBFBQBeB2BBFqJjxBIa5IVz7ESXXDyJuCRt:hyBGBFBQBeB2Br+mzlyLt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3558294865-3673844354-2255444939-1000\{83BB4FF4-C448-4D4B-8285-C590C1ED446E} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 628 msedge.exe 628 msedge.exe 4796 msedge.exe 4796 msedge.exe 992 identity_helper.exe 992 identity_helper.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 2724 628 msedge.exe 82 PID 628 wrote to memory of 2724 628 msedge.exe 82 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 1308 628 msedge.exe 83 PID 628 wrote to memory of 4356 628 msedge.exe 84 PID 628 wrote to memory of 4356 628 msedge.exe 84 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85 PID 628 wrote to memory of 4920 628 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65917277eb65f2c3061f718abc911317_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd17b046f8,0x7ffd17b04708,0x7ffd17b047182⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3188 /prefetch:82⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3312 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6880 /prefetch:82⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6284 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,11367157882616165254,11084247837857358459,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD57b9153f2bf5fd420e7848e57ad5c8bd3
SHA13fbb5247fd9095b9b4b7a79552eb595fa544bcd6
SHA256a985fcbc5ad6c32d459021bd3867dc73bd904dc910f6501c9ff30b0f7bf46789
SHA512d9f515719445b81d03f0a4ef10bb1b905bfff8a01e8fe22ac4555741b8f6511a18b56c6659433cb7a7c85c92a03af702ea3ea49f85386d4dcfd9002e821dc80c
-
Filesize
1KB
MD510a0524886204dec2b4d7446409cacc5
SHA105a921ca00020a617969e2e4b8b2b2ced2155934
SHA25691d8f568ae5302608fff5c0142a0ce0fe2ebd585c1b81748cb8755efa50b46ac
SHA5120ce6495ef24fcd472e74fab8f68a4e4fc4c8e1502e7c727f38279de9da0525ffbec49b0d35a85f07cdb0522e06ceb762426ad9ffcbfc6a1885051562beeb3102
-
Filesize
5KB
MD56404d6d97ac5b19f20a7a2a7b6087921
SHA1e68e6de96ebaeb2931ee1d8f2d8ef09445c3169d
SHA25632776ec8b2a989232a17372e71ff399c0c3f03c9395b2fb856c187585b45e38e
SHA512929aa897ab8e459df617a3267ea51e1580d071c586dd885433f4bc27e0544c6a7eb729b8ed37aeeb73818cb997f4cf32f304d2e001fc33714e33eb0b2dcf5754
-
Filesize
7KB
MD58f9ad314a0aa490cb972486bcb90d1e7
SHA11045520d21caf5bcb8224f206413fe66e45bad92
SHA256ef1768797aead860a1cc0c341fb862963e37fa3e60f9034f04e06ab05a5fce2c
SHA51276c1bd2abc779fe3dc27137fee510edda29f63ceeff803bbe5b686dbd50c2fa48623d34ebfaebada527d537464848ef9938b0f0438ddf43c7a9320f4d222f068
-
Filesize
7KB
MD5ba4cd8443b385549d5fae017bb53b8de
SHA151d75cd955c3f945c69b12abb385544af1275241
SHA2560787b589e537bd31c28942c2972a3a016a396aaa1a81053452d5d11c4f085e37
SHA5125bb316d40ee71ebb4e76c979903d9ea2697577c26f7cc74ef1584ae5f87ebd92ed96dc0d73f816b85dffa0dbe36aba543f7e3970ed8a26463f12989269ef5f83
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD50ed6a0c63aeaa27dd9ee5397678947fd
SHA1b37e9efe58c903808a07c0c0308cc90136661e79
SHA2569b0d1ffd2f64e80491815ca976c435bc7333c5dadffaa35e1285c42196c059c2
SHA512105d646889b967f43a721f96a8ff619a1758475ab9d61020d5af9f72b57a9a46bf9211cca57cdc4acff10d1ff2a4215182d8835d4bcfc66fabef423d2fec2bf8