Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
8921d4287a0a92df4a044a20bc637f42_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8921d4287a0a92df4a044a20bc637f42_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8921d4287a0a92df4a044a20bc637f42_JaffaCakes118.html
-
Size
55KB
-
MD5
8921d4287a0a92df4a044a20bc637f42
-
SHA1
647a337747cdd20a7a942523faf782705a30e1b8
-
SHA256
ce8157df25b2efd936620e005f80d454356cff256fffd90a41cf3c1cc07094e3
-
SHA512
5f6cc7663220c3a96e3fea6cabf2bcf6f6f2fcd75fca7f7ee56487423ddaff8b4c230dbfe6240b4603e2c0c2bc1960d11434b6620dfe2b90540eef1c4362e635
-
SSDEEP
768:oKCNXPIpBPqVKYrkZ66twMAWVMTdoSuzrBJLqngqE/QgANlKR3veRHZEKj:vGIpBPqV56nAteSqBJLPFATHZZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 2784 msedge.exe 2784 msedge.exe 1880 identity_helper.exe 1880 identity_helper.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 4576 2784 msedge.exe 81 PID 2784 wrote to memory of 4576 2784 msedge.exe 81 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 3828 2784 msedge.exe 82 PID 2784 wrote to memory of 5028 2784 msedge.exe 83 PID 2784 wrote to memory of 5028 2784 msedge.exe 83 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84 PID 2784 wrote to memory of 2292 2784 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8921d4287a0a92df4a044a20bc637f42_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc53246f8,0x7ffcc5324708,0x7ffcc53247182⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3776 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6540 /prefetch:82⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,2474195967384396604,11083303283359400592,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5240 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD55809753842ac250eac02d092124249d7
SHA13bdc3d2ee7847c95bd2c9a4145b872800cbad3b6
SHA256115bfcb851b83b25479dc1b0f36d05dfa559d3cc357ae0a115ab57a4d7e28269
SHA512f84dbaad2a2417797ca500ac5d5d88c2f786de155f4e08147562e439d6fa418d5a6bede10bada941c2a5205f53d5b8e3d7cf98e18a5459745410dde38dd56e70
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
44KB
MD523536ccfe05b737ae639fe63ee4cc435
SHA16d2e9822835dc3e6117a4d2addfc8f241fbdbc82
SHA2566ae9edfc411ede03661a3d910fafddab3d6b313d1f4668dc8c5a84c5ab23a3ce
SHA512f416e36b2322bbebd211fd1ea69c88883f00c7b00f14474a5fcce4a408840c0d1b0304eb8941509a38157d0583485f638959eb7d5b9ae668aa88c1d3eee8dd0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5ee954901447fade1818bd1cfca585a77
SHA145891027520df2cce8b1654abcfebb56ef177902
SHA25606c116e7677671897eb935fece45f189d19c6802656bd6ffa66ab9c5cd68475a
SHA5123f13a9eefe3cd476c760fed763610557548c08d241ccca47dc191c9a9b0e752d1c02859e9b14ba763f369663b594f25986254c4bb82fb0842df1b0cb508dfb34
-
Filesize
2KB
MD5b16bfb690cd9dfc51933e4a70acc597b
SHA1a7782f7cbc67c0961bb52724b9c28407c99e05bc
SHA256d5609b3481c900bd9a3629bf26f4e52f93010a1aad7676ab46576266e820b073
SHA51234ec46885eadcd3e73b82aaacf41c250e2fafc75f53da34e8b30391f2fe8a3641c0cc6cdad6979756b734751eaf094303f8ed4b7c8ca3568d969e7484ae01345
-
Filesize
5KB
MD5137f8b51c796e84f287b6dccf5377684
SHA1207fd0880f574aa063de2d3f8371909697da48ab
SHA2567f3dae0a4dfe2b58c3e6cc5bf76e065456c8f3b5b3ea3a01d1ecb49712dc0432
SHA51248cfff4911dcb7c438f6de06db9315b775fd334469ac8ad3e73060716e2a15457b8c3483835fbe9446458ca2865e1af5d825a8c08a4600dab796835017ff6ddd
-
Filesize
6KB
MD5212b5a10ba305d876e66a7ff9b4933c0
SHA11ad6fc5ba75c59c7bace58bc61a1b568a06495ac
SHA2564a16ffec9bbf965556900f7034a81ee7d1b7c8e061c48029ad4d34722b222b55
SHA512dc22c8c4e3aa95931fea949c2143e7b58e421db1068042e163de733fba10080a28142010b857782213fc108e44803e38590910f6f57afc9472dae261879fd639
-
Filesize
6KB
MD5346517fc8f78092d68681f1dc1309649
SHA1978cff4f1b191056bc932d9b8d09f72b040c32cf
SHA2560b327813790aa25376437eaf36b607766c4d60f54be2a7f5b45ff2a54080a282
SHA512db4b9edb8c4cae2146546ed6017089669b8626a99a1cc55698fd7095bea2d9d2c349d42fa416bd81e6a738c25f829d1d0eeba6278d2caf20d2a7329dc8ae60c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51a0be135e7b00b9af1c0353dde2fe32c
SHA1047148104df6a6d05b162716064771f22fcd67c4
SHA25690c353016c78d9c8ca7b6f11c02c5c6163ef096947a92021374c0aed89eaa59c
SHA512f51ac77aa053131dd9ddd1d02f2d972755cc422a518f1701ffd7f8b2dca5f90abbe6e2f4d819334645da44bad65675c19c55f957ba7aec08dc3b43deedddfe67