Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
65c247084f527fb44251f44e27ce993e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65c247084f527fb44251f44e27ce993e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65c247084f527fb44251f44e27ce993e_JaffaCakes118.html
-
Size
175KB
-
MD5
65c247084f527fb44251f44e27ce993e
-
SHA1
199fdba249053580db26636d2b8891beb0ddf049
-
SHA256
862e9b117b73af024bf20a6428b07d64fa4b0e50c4890bcdae6c529e831e6c92
-
SHA512
33f4ed15c3815949fce1ad4fb82ade67d11463ef69e0b4efe8385009b4fdec3636522d21e7c702337da28914ce7c2ec0e94be23cd6ace4d23313ed98115d9728
-
SSDEEP
1536:SqtY8hd8Wu8pI8Cd8hd8dQg0H//3oS3cGNkFuYfBCJisy+aeTH+WK/Lf1/hmnVSV:SBoT3c/FHBCJiIm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4076 msedge.exe 4076 msedge.exe 3440 msedge.exe 3440 msedge.exe 3052 identity_helper.exe 3052 identity_helper.exe 5808 msedge.exe 5808 msedge.exe 5808 msedge.exe 5808 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3440 wrote to memory of 4188 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4188 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 2536 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4076 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4076 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3512 3440 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65c247084f527fb44251f44e27ce993e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff76e346f8,0x7fff76e34708,0x7fff76e347182⤵PID:4188
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:3512
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2300
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:2940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:3080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:3504
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵PID:1948
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4456 /prefetch:12⤵PID:5008
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:4696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:5496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:5504
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4602353821736720791,4663497325749744147,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5923f3c114b44cbefa92b4b465c8e8212
SHA152f2be1a9334c7c182c502c7b44c44e9c6ff43f2
SHA256dabddae4d02071ec0ee7a12d4744506b0aae544b56520fad5a0e5d8db182791b
SHA512599cd9b3c3c7b314e3ada46ab46275c74c557c0e18e1be3fc0128ac36d3aaf8b1b64c1ef3cd891474508e96c4987133623db66bed54e91e9c8dec41c3be31743
-
Filesize
2KB
MD5659caa96c8e6acf9c3f74c7d181de9ac
SHA16b8bb0d6b94db38b7bd76cc0a2e458f6b236d270
SHA25605a132e54b7a6ae2452d3f007c09072856aba8edcb9b4a86ef3afd09c65b5b4e
SHA5123639a124234d8c990e44caf5165e41969ee8b586fd9e615c8156921517d4292e76879f748b5d9a613882ec9621426383dff8db6abdcf607c8dc81dcba46530bd
-
Filesize
2KB
MD5c347d2a06e72e8701af7d9a8ce99e70a
SHA13821505f1c88760a57eebc7338d2ef719423b556
SHA2568145b807a151a5674397bcef934b1bac6f7bbbd13b7f53c46249e800b8cf1f25
SHA512aae3b0e7611db7666c289747d39376fe2b40a663255b8bf6ded838aca095d8d521896cd505f153475e92bd679d3a8c55f54d34c11ea9317899e3b94fc84585a5
-
Filesize
5KB
MD5f3e5f7742e81355d03402aebd9daf629
SHA11f76e95a08b7dbdc530aa98b18055ec7d136530f
SHA256c751cbdb79dc1fb1e30e07119eecc41977a7c7849be65add2ff5cd9ca303eddc
SHA51215a7b5e554cefd9c2ded1201156e1228b83c07ee3fc0e72c633c2ece4ca7ff11f19143138edb008b47de74676e1853289d02ef56eeea42d99fff40a32523183d
-
Filesize
7KB
MD5a4f301bc45da88e00fc4328658d18212
SHA1d60c122693e905b564d896368a3ff0f5ce64a107
SHA256372235e869df021f1f7fa9265186006b8237d39c28b4f181f19ced6f9fbb58a2
SHA512bcdfe849bda90311d3456b7582c8189d6227280c44bb6511ef1adaa656906e07c41fce34073d1e16f928e0142f05ee49197c6f0070fb5baa56ca82f164cb83cf
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5c2605d217d818b611fd01e9291831d07
SHA13b93e7b1560fa511ee9fb9e0308b54e024080c2f
SHA25602655987602328bdc5f32f3b862c311472bb3e284b6cbad43befbcb86d47c0b2
SHA5127f4c7ef62c60db16310113565f12bfee5eb50c046ede7454a80a12454d97352e19cb996fbd9999ea47bedfdda02369f0740bc8b9ce4a99442ed8ce0247b8856c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e