Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
a75153136658601c4db90ba47c1f2b94_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a75153136658601c4db90ba47c1f2b94_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a75153136658601c4db90ba47c1f2b94_JaffaCakes118.html
-
Size
26KB
-
MD5
a75153136658601c4db90ba47c1f2b94
-
SHA1
6ced57f3c0f6274f5211d8263ed5e6cc29949bc5
-
SHA256
6513d32a48e1841963e496c8a84d86f1fb65b40bb0bae0309efecd07a7396ece
-
SHA512
a3a01a5ba566f97becaead9a1b300741465603a36f4fb61c19f0430dec97fc459155b1ae06d945e00d381edd9e83f4842780bcfcd033d6d446373db14bb7c3d9
-
SSDEEP
768:SzdTOVXJsqLiwDyoJD6X3fupy92YvXmaZZVZeHmE:SzVOVeqLvDB6Xmp3YvXmaXVoHmE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2812 msedge.exe 2812 msedge.exe 4872 msedge.exe 4872 msedge.exe 3432 identity_helper.exe 3432 identity_helper.exe 3804 msedge.exe 3804 msedge.exe 3804 msedge.exe 3804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4872 wrote to memory of 2708 4872 msedge.exe 82 PID 4872 wrote to memory of 2708 4872 msedge.exe 82 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 808 4872 msedge.exe 84 PID 4872 wrote to memory of 2812 4872 msedge.exe 85 PID 4872 wrote to memory of 2812 4872 msedge.exe 85 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86 PID 4872 wrote to memory of 4436 4872 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a75153136658601c4db90ba47c1f2b94_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9aad446f8,0x7ff9aad44708,0x7ff9aad447182⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2152 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6556 /prefetch:82⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3121505367049897099,17504523204083297233,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5b71df4054ad45da94d40b54956527a6d
SHA19edd2fe4caf92c2bee4fb9e51d525b4740209398
SHA256ce16baf1e7236f939e1c0f64eb1b258260d3ad5c9fcee0a668ccab4a0fec1383
SHA5128f21702b1f70e88480ae07ee5b794b6d22ca36c89ac361eec5e7cf813805873662c260d39225a508f784bd15fa99cc783e84227c3b501d3066d479b0e8cdc5ca
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1KB
MD5de948e53c79333a3ea8c0534e88c571e
SHA10df68dc24412857c0c1ba8488bc41059e1b2237d
SHA256fe9fe467b943dfb8ec7a7d9160cb6db383d550bd041f1d9990932821bbc2bd5e
SHA5123977031cb866f1ea6b6a6e160f6dd7ff6b910309906dc3a43afffb388dbd1c74c4f9a71608b44225b818fcb0fad0051ffb3a04618ac6a89c1cb46eeffd6d1a78
-
Filesize
1KB
MD5ca14826a8872b3f1d3b0c380621bb0d7
SHA1566774412e3083c7d4b47df5d0b4b001208e3873
SHA2562aca08280fa77395684a19f35fe337ba2b16b35ef843193bc60a702e75c67234
SHA512a2a6fe9483ca4dec270d8b94d3b7febfe5a060cfda9c079ad13102a2073ea312b9f0c910173ac8e1643fc7378f4cb2768493b1ad5f8fcd0fdb1b2d63258d6fbc
-
Filesize
6KB
MD5122f9f8b2014ec624041c2a1299972d7
SHA15d78a09fa903619955f51e5a83811372d44ab00e
SHA256cbdad1eabde9add78d66a3aa870536117dabfb0597e8537ea31e964debd43201
SHA512760b9e910915f8d9af876e47b2fe2cb2637e3d51f06b70c77c8ce66a839ba77359223b102fa5dd1ae81d2c6655b48115db3325c1a0473c67fc24b8ffa48af40a
-
Filesize
6KB
MD58a4d7ca172905a5c626cf75f06324826
SHA1dfd47b678c32c4661365c100451ee47a18be2f78
SHA256401ab91393660005deef4f2f1c49ec418980104677afda562f9cdc5007d01cfa
SHA512ae25e7a14a540003a72e8539595e0ed813b6fe07aad21dba731ef8124990afeedb899961025ce086582a959563992f2c761b812a34056ed231aa8f0402cdc876
-
Filesize
7KB
MD582404f764e66732398a225ee83086924
SHA10e1160a1b2b6cbf2a5000b87dce4018ffe856dc3
SHA256cff71504c7865652ee92f536640907d56b8b16e872984d4dd577730a17a8909d
SHA512e5dfe41c24ba3172176c24c0945a13dec437af69d6865ce383196bbf7689b316430a7655fdfed317dfebd9c047d22b75c12d2602c7376fa450a016ea57451f9d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD525575e71cc4c161133db0fb1acdd59b2
SHA1c9cbf89082a78e24b939c6f7afdfd7ec93713b81
SHA256343c72e2ead668ba7a202c7cd738a6a1cb44168254c40c4969fca190405fe069
SHA51288a01a23735a7dbf1ba4395705918055850700c73f224134804edfa2ee1c4eb1ffc9d5c31846380a3f4fc8cc4082928717dd9e400a9bb1bf64ee227e44ffaa6a