Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
a883342812cd348ea5c76c15a12cfa15_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a883342812cd348ea5c76c15a12cfa15_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a883342812cd348ea5c76c15a12cfa15_JaffaCakes118.html
-
Size
39KB
-
MD5
a883342812cd348ea5c76c15a12cfa15
-
SHA1
a5867d8a34f04425499cfee851a1a76f6923d0a1
-
SHA256
770045284fe7d1ef76d8a176a258fa93565629e97eba9e933d8b3251a1a18c94
-
SHA512
dd61efbcee5c914bc6eddba78503a2bc9840cbfd6b68ba2bef4e524f5091ef8da0be5ddd78d7fbc8f78a19a065afabc1a82233a5ab6186a3f56aa56ccdb497e5
-
SSDEEP
768:FY5kZUwhv4heC+qrUEOqReHBZ4qqLpeYBZ4qqLpe8PqLCHBi4vpCpm7oBi4vpCpC:FY5kZUwhv4oZuUEOqoHQpHQfqMcLNcLC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 60 msedge.exe 60 msedge.exe 4372 msedge.exe 4372 msedge.exe 4656 identity_helper.exe 4656 identity_helper.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4372 wrote to memory of 4092 4372 msedge.exe 81 PID 4372 wrote to memory of 4092 4372 msedge.exe 81 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 3232 4372 msedge.exe 83 PID 4372 wrote to memory of 60 4372 msedge.exe 84 PID 4372 wrote to memory of 60 4372 msedge.exe 84 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85 PID 4372 wrote to memory of 116 4372 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a883342812cd348ea5c76c15a12cfa15_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb7a0e46f8,0x7ffb7a0e4708,0x7ffb7a0e47182⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3044 /prefetch:82⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6256 /prefetch:82⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3131365543288320285,129081498479005462,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5572 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5a28ec278cc6d556107192538084355de
SHA1c1361870a747f1d0bb8bfa6f1d72ee2f8856a6fd
SHA256836b3942ceb43a65e7478052db4b0aaaaacadd87f6e142ae7cccb959cdca945d
SHA512e72048c0654b41a33972e48dd774b5c278e4a2d325358a0ca3c2dcdfddbfb1148b6112b81acd0f3ad9dbe7196c5e9d02ab975192260cd9efef0dcb375a4aa98f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5123cbbe3323a4e49c476eb0a2df47e6c
SHA1188739d174bb18a7e60cfcb0e1ba48fcc22c5a04
SHA2567d028d9c78314d56ec038be297b4176e9726a126596a34b2eb8d15c3e23af651
SHA5129d389a80dafcec05fc16ddae81de622f3a6ef0d357528819179d6bd7f487f91b34645f8bf61ac86f9d845ea9d35e6b4986a9cc7a541a247392ec0db33fcb14c4
-
Filesize
1KB
MD5dbb5eaad473cf539c39fa228ad71fc77
SHA10a022de95f729eb17a3d855040e457b57ffcc0e2
SHA256b61a90b58436b9408bf84339cad33cad2fcd86c0e726ca27c2eb0796553c64a6
SHA512c1b3d056841776db948de8c880527987baa60fe64a5d87e4fa242847c3b2ae2e1898590a81343b3bea3d241050f50ced563123a26089f352d198257f5264557b
-
Filesize
6KB
MD53bcf1bd9f6f990d88d24637cca71f106
SHA1e30afbee9fe0fe02496b42009c3461d0e8bffda0
SHA256f909ef6568d1fa18b9f35c8554d8b709afda69c98a60d3c6784c86bd7808eba1
SHA5127a124e1019544d5ff52a54c9be54f8ad6083b59fe7de30cb9378e8a76482bc72601553695979de57d54b315ade2bcbe7d614fec2ec89877a745941c87411db47
-
Filesize
9KB
MD581c3d440972726ead6a8b30109278e6c
SHA16bb1648de10eadc78fef9d763feb26d463c3a278
SHA256dda00aa40e1ef0bf2dba8111a88537d4e97fad3e2426d36df8964e6a3a0373e4
SHA512c1c5b037561c18fdc14f325dc1a3dd484db87501392c7617cadb9fb17e312a9cb146d8eff09c706f0cae61f6f1fb3c0993ea457a45e8e2b5747a3fa8407ea66c
-
Filesize
9KB
MD503b7511f29e9fd70fa64d2611e9f7b63
SHA10e31f7d8a164cbf4cd6f413ebc92a7812dcd9c26
SHA2562a33e53aeb2b4397f0b16291ec4363eda736c097bbaa776d60930e01a39ece50
SHA512bfbf47e601837819c95860b626853145125d5f6c6a559179fc99718bf680a30aa420d6811f6c3ce049e23e166617eba207962ddec3918bbfa008a8244a0da569
-
Filesize
9KB
MD5683d018262d9d6783922453eec5de9f2
SHA1ebbd4e7aaf9380cb503b985bc5dc31574ee8b295
SHA25653e1157d0d6c0bb1b28e8119140e2cec4d2fc8c3aa546ee04b332e318d8aa59d
SHA5125dd8639bb567c3692d97819fa3b449891cfc970af954ce3abb8c1ab9ec79a25a11d99c2e5f24c7993ec93a5d00b8eef3a8318689cc5c97139384b958d7a6ca63
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e1b52bd4b6dff50f0def3c9232a60fd2
SHA108698bd1090adcdf189e51daaeb54af25d425cc3
SHA256fc4a7c114f59d9a90416c4c43bb3eee1fc2e7db7bb147d1f92780e81689899ea
SHA512bb75c31f130af45b4c51051fd78a19a084417aeb7dd3880bedd0ee2f4dadbfdc22459fbe524bace71656a441d9871bb88a7095ae45c50c33a43070fbb826e929