Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
841569cf963290c493b422fdaccb937b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
841569cf963290c493b422fdaccb937b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
841569cf963290c493b422fdaccb937b_JaffaCakes118.html
-
Size
18KB
-
MD5
841569cf963290c493b422fdaccb937b
-
SHA1
82a982d536a98b4dc1f357cfaa5e7a1bf136d43b
-
SHA256
1addc11aea7e871b7fbd0738eecf75e7f4b730ccf2b19f2b06f50513873ccec8
-
SHA512
dd07c09100aa1f62cd318d0f1818a727169f487b9ef37a3457f8a46e84f0a556fb071e11e92ffb06a6ef693d44291a6bfec6deb946bf12631afd79c63e6e28bc
-
SSDEEP
384:LZtXuVqs/bMR3LkqsFFrazkrjvWg4SuNII3RP1nnbXcVk7y/oTaZNDktGyiQue7k:90Us/bMR3LFsFZagJmII3RP1bXcVkW/n
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 216 msedge.exe 216 msedge.exe 1160 msedge.exe 1160 msedge.exe 4260 identity_helper.exe 4260 identity_helper.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1160 wrote to memory of 4272 1160 msedge.exe 84 PID 1160 wrote to memory of 4272 1160 msedge.exe 84 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 224 1160 msedge.exe 85 PID 1160 wrote to memory of 216 1160 msedge.exe 86 PID 1160 wrote to memory of 216 1160 msedge.exe 86 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87 PID 1160 wrote to memory of 1492 1160 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\841569cf963290c493b422fdaccb937b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9903a46f8,0x7ff9903a4708,0x7ff9903a47182⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,14684372963073745524,3630380565746386278,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,14684372963073745524,3630380565746386278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,14684372963073745524,3630380565746386278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14684372963073745524,3630380565746386278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14684372963073745524,3630380565746386278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14684372963073745524,3630380565746386278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14684372963073745524,3630380565746386278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,14684372963073745524,3630380565746386278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 /prefetch:82⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,14684372963073745524,3630380565746386278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14684372963073745524,3630380565746386278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14684372963073745524,3630380565746386278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14684372963073745524,3630380565746386278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14684372963073745524,3630380565746386278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,14684372963073745524,3630380565746386278,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2628 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5352adcd061922da45ad019430cb085ba
SHA1660362d1c911ff11491e2a0e4dac3da1edc6045a
SHA256b84162b9fd560dd2a9148633ffe738dd86e79d6b6ee4a7c20fb1af9d59af305e
SHA512b92ab4ea751dfc222d6a4ebacb639bcfb1a3b7ab832560d696cf355b5464ed8efcf8bc626d76c5a07adbcfd151f29badcd5fcc04cc7ba55b0b036be903c77d40
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5b270071f239ad2c7552fe865a714bbdd
SHA1b1bb08e3c84b349786217af20b4b428c987bb671
SHA2568e9269804495cda8fee8bd00fe4dea3a2c388893affde15084dd698996371157
SHA5123d2abf4047ddd6193b6d02af3690468e76185d3947cf69493c9ecad5e5c52e23023ad83eb91ccede23d9eaf02ece56a20ebcd0b7a11d844bc6885abffe31bc7a
-
Filesize
1KB
MD5686a2186ba4afb3d11249f11e4107c0a
SHA16219a8b01ff687856928b946c2b3e395b0993274
SHA2566088af40b0d0d709dc6d7ee996bfd3f9bcbe0b9e3b400e4e28bbf7da9febfd0c
SHA512d7c3d2717bb9a4a436b587f39ca728fe76550416a77964482a0366d35fa9f342707eb0270f24ff6f26695020d83c2a38c2af833d342e9c57cc952988d40022ae
-
Filesize
1KB
MD5d461f54a60443bdc1d01a65f45abad19
SHA1a733fcf7894b5e43840d9e57bbc036092c16a8a9
SHA256bc04662e19a3dc5a5ff6052dab68e77e464c1047e7acfb01a21093190602543d
SHA51289bb47bfd9944c6d66bd9659bc03088f620a170d9df4d1e5fe46132605ada0e6dfa78ed1794dff8a64201712872bfe3255734e35ff1052b740a20d4751ab06fc
-
Filesize
5KB
MD5f7e61aa4f9a7f66ccb5ca34143ae3757
SHA1c0bcd17cf95773d4526f595df9373f5cbe0571b7
SHA25610ed374f5168dc12af278fca0334046d994545ab9f66631babb06cb07991e056
SHA5127f0f0e4d917147c8a16514181b692daaadeb2899ecbd700a463c1fd4683976380bb1984fcb937c9b52f960e0f3208f3a263cdc9affcf869c9bef0d9d59d9414c
-
Filesize
6KB
MD54750112d1b7ee38b7a40d32935fa7df0
SHA147a98c3320b29b560a0af8a8fe1878615b2a6987
SHA2567a282f3dabc87f999963da4717aeed91206ad10f6788a038c02cdf2e7bff35dc
SHA512531a8a29f47effe099f37ba50ec0b57ee3fca4c278fd23e1e210011395ed8096c714891c4840f265a57c9ab07013a2beb4514e0cc3c7b6a8ae6046266dbb6718
-
Filesize
6KB
MD5611a05328c137cb7b61bb4d8e967db47
SHA150cf6e058786d2d0820d1f8086b8af6b9e1b6708
SHA25666ab4c8abb52195a6082e28b3b70f25b84aa1e99d9c7a7e17c2de710a0e7c107
SHA512aa39e15772c71b726a8d9c654e65c900786f2e3f0152f08fda83c85908792485d1e106c51b296ccee6ab19b0423cc3389a5f8881d5681b3928a22c1cb48258ec
-
Filesize
7KB
MD538e987ded4723497e7aea84290b7b93a
SHA138646d7fba0e4d37175435a8d9946ef6744cd113
SHA2565a8e09217ad8b600aa442cb254a8c035f7709d9d2c7768bc7e6633abd593f87d
SHA512c6f7b0848fa03adcf7b79b1ec2ee2c617450f58b4d3147d9cf10b5bcb2f9f8066719498985b67044f880da37bdf54f85de33ae1e984cceac3fc33fe2717cc693
-
Filesize
706B
MD516c953bf582783bdc2793318ddfd18c3
SHA186eb1eec2925a6ac9eb83b83cf7797eacdd946cb
SHA256315489c69c0c8cd24030003b1a2a713aee8feb32349f5bf9973158ec21eec894
SHA5120556cef34be184415e708a12689f81478cc7573b506fb1970ce38441c3e10a73a684de6fb263dd6ed90cef2b9e84a39aeb424d1e9ca25384f8c06459dc106d85
-
Filesize
538B
MD5f0b06f4218ae7d92a4151a0a5a68a786
SHA1d706d213f283f9da36c4d73e1090b77b4e536fa4
SHA2562c366e43117c399fe44b4ed534458fce16291f65ad6734bd9d2c87c437cfa829
SHA51231c8f61d159a86b59d1138eeaea66da693b5b2c255858c949417ff899345917e6277c51832a4cbbaa1f06a1697cfd90233838fc8eac9d5db9fa674016f790ea4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54bbd5b516b006c7323e5d98fbf14f27c
SHA10ccf0df82ff377c989b128c22ff66d0b916d3008
SHA2566c2a1cab845296530fde29c44310d8d66540dc586661a060effa053f1b52d864
SHA5125ad810cb730084bb5a4c0610b96a58c6c60779fd46e6ee5a0567bd2ba99bdeac8c3bae0a4498f429e1e66396d94c6783d54727408522116699e526d1da2fa132