Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
66bbf14cfc70f2cb3712d4dcfbb55b3b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
66bbf14cfc70f2cb3712d4dcfbb55b3b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
66bbf14cfc70f2cb3712d4dcfbb55b3b_JaffaCakes118.html
-
Size
175KB
-
MD5
66bbf14cfc70f2cb3712d4dcfbb55b3b
-
SHA1
7e40903f9f9b8c4823b390df78da108d4fda3844
-
SHA256
2104918c6b9999da34d0c93def380b2542b053750e773feb9cce135ade3cb9d2
-
SHA512
1f03ea66b768e9f2128f503230fccf3212a139abe4e301979f2e758998ddcdda4ece68ad54c8b63bce1a3e8c0d754431c301b0414b34b1120fc0ed7166ad559e
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3kGNkFmYfBCJisG+aeTH+WK/Lf1/hmnVSV:S4oT3k/FvBCJi4m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 744 msedge.exe 744 msedge.exe 4016 msedge.exe 4016 msedge.exe 2220 identity_helper.exe 2220 identity_helper.exe 5964 msedge.exe 5964 msedge.exe 5964 msedge.exe 5964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4828 4016 msedge.exe 83 PID 4016 wrote to memory of 4828 4016 msedge.exe 83 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 3772 4016 msedge.exe 84 PID 4016 wrote to memory of 744 4016 msedge.exe 85 PID 4016 wrote to memory of 744 4016 msedge.exe 85 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86 PID 4016 wrote to memory of 532 4016 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\66bbf14cfc70f2cb3712d4dcfbb55b3b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffadd346f8,0x7fffadd34708,0x7fffadd347182⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:82⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13914543982281444659,13785672842992536858,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
19KB
MD5b992c177fa0ef093925b3708912a6b62
SHA13f794d56fe8208c03ced8c7f8eebcd8ee49a1ca3
SHA2566340933abea2f958c8e5ef647fbbbbdafcd9b5fa929aba37a1ec8504fabe15f5
SHA51272fbcf1db7a4d4e86895a2e0309e54177589ab5ca07142db80cc203a668feafbfd8f6f44b7b7bc387380a487ea8da10d88449b0d4261696e498fb2d768a0365f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5e4e941f99ee0d2abc2ffa31ab3c00b47
SHA1bb1508d4d35b590f11b5688c4da6775c6927cb8c
SHA256870bded48309751b330a00a697214b466a6eb14fbb9193c641a82c64c48ca9d7
SHA5123055d0a8897dbc1df75d2e6aa2868447a946ec2b411398ca17886fbe3c688d76d99c0ac34cd23a20475c36738f0c8904f4d08cd1047679dde60aac652882d013
-
Filesize
2KB
MD5f91eaa3702c150560a4270ab037f7fa3
SHA150b7b6de1896d6a772aa47cd7c720ab6e4e6a2e6
SHA2562730b2d3604cb6bb504ea31612c1ee14ed62e71549b67e19d0d1da117297bdd9
SHA5127632fb96b6ff3578abc084ac0069531a9024d90a884b064019e6db1c0833acc61d921fd1fec278a6632d6782e5c4ac156cd3e5f75fd6debe2f385f18156f53e5
-
Filesize
2KB
MD512ea7ac9d44c4f26b22b4831020c89a8
SHA1ec0e0557e429f2878caa6963752e53eecb5acf13
SHA256ea760ce22af7388dae131e1ffaf6083c62dd0dd6931f35fba671b97ebece1374
SHA512845fbe04e6032de64f9b2c78a0b133196d2aab3515df1533ad8c5faf8489ef3135f9f179a271c9f71e2e87730df1358410ea63546893872c810c83125d23cc9a
-
Filesize
5KB
MD51c8b3dbc3f248c788f73114793f3e93c
SHA1d1e7912973fc74ca279d31fafc3aa5721c8a7af3
SHA256cf6fd8479b2d7592997acdf3ffcbd5f84051eb0a32bd16f9f76b97c61f6349dd
SHA512d977a59e726849b8dd75749f7da601fa2cb74f022b6d55cb9ef7a38ed564b8144f9c54cf4e554e8538c18fc2e6867deb5e6b795af9d86a7e654dd032a3f2e9d7
-
Filesize
7KB
MD5117efcb7e76e21ef24748d5ee612a9c0
SHA1b98391ccb9246fb92667f6b8afd8f86cbb4710e7
SHA256977e5dcff0eb3b21fe17f0b64de721a11703d5ab06cb1402737685ddacd8184c
SHA512955c422b2a6f1a78505ba27148c51313c8df6e61d3c77bd056e62f21f44c64e63b89512acf7706b26764a75ed07e2e052d65d323a791991c666aef034884e5e8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD537ce10fe757b63e7a83ce1f1c75e7738
SHA13cf71ac3cd7d51fa4ef4c526998796a5a5245d4f
SHA256e2cbc52d6ab9461354da62b4fc92c91251e520af03fa80022026155be86df14c
SHA512fd68e8e5a93c4ce9962a4007cbe8b76440579366125973712ae13cf784ce17e4ee8a63d64caaa25d7ce2a7502fcf4339b7ca91b03419f1d4c7a46c81680855ea