Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
afd6cf2a12873909e87e35be74abd1af_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
afd6cf2a12873909e87e35be74abd1af_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
afd6cf2a12873909e87e35be74abd1af_JaffaCakes118.html
-
Size
175KB
-
MD5
afd6cf2a12873909e87e35be74abd1af
-
SHA1
c16b1143312f2da5f6549c09ab7bbd2f1026af24
-
SHA256
c1222955be6a44a1ebd4a4a5ab546f1859a3fae311ca371d45264f16eb1cea9f
-
SHA512
a26b0785b2a1b05fcf53155b82eda441a9d11996ecd4182ea087a235e86112b782803396979c4e2f8443b97d8a734fda06a0b40a3a136482593bed6e83358b38
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3LGNkFRYfBCJiZK+aeTH+WK/Lf1/hpnVSV:SHCT3L/FkBCJiJB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 1456 msedge.exe 1456 msedge.exe 4060 identity_helper.exe 4060 identity_helper.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1456 wrote to memory of 3988 1456 msedge.exe 82 PID 1456 wrote to memory of 3988 1456 msedge.exe 82 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4940 1456 msedge.exe 83 PID 1456 wrote to memory of 4028 1456 msedge.exe 84 PID 1456 wrote to memory of 4028 1456 msedge.exe 84 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85 PID 1456 wrote to memory of 4708 1456 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\afd6cf2a12873909e87e35be74abd1af_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac76d46f8,0x7ffac76d4708,0x7ffac76d47182⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:82⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,13100979021680276547,12686941053525754003,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
46KB
MD53dda883b89b1f31dd1e8e0be2d4250e9
SHA1ff69000e8307afcb2b4db7d6117b47975f9de06a
SHA256e60268695e6c66a62ad318850e45954bb22d21f2ae62fe9f0c5490dcb1e69f9b
SHA51225176c5acc9cf658129508ccc1b7fc8e93777cc59a404caf06a0e0eeb7c10b5276923aa51d56a99ebfd45d9f05b16f598794fb31ea0aa39565770b3c3b8c8c43
-
Filesize
19KB
MD59e3954e384c5af053acffd96b63a7289
SHA174be79c98f6daafdff906e9a2fb3f44246fb94da
SHA2563cdc949b2b68103b862b14487c5cb36e138ef9bc7cbf23b2a90849c28cf606c5
SHA512b16235a6be76e0281971ad173bb782b9df275839e15267ce54e45c40d30836055b2be31c7f273a91203ea4de94ade39b0f11d7e9c57bfd0d38f4054ab7f53fc0
-
Filesize
96KB
MD53e0379fa3f0f53026f5db1397280925d
SHA1c0e0f3c1456fdf51ccfee7412c2fe8d6512a368f
SHA256c5aa76c615cbb43f20f84d8b941f99700669670ce344ed0347db9ce7c2571f18
SHA5122b198f0f5defe2f494326af7c3e06ce5daf588eb386c365cb4b39a8d9fa8c91fc9872290fe8bcdd114ec178634a9e15e381f78d3a46d82e7887ce8bd566367be
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5cb56d2ffde26bece9bc8ed61f93c263c
SHA1f23d9e3b12cc2e5675769819bf17a15af80ac7fa
SHA2568c2b7e3fb8b0890b9965a2fd915abaa177a160667f9fefa665b98d20f41bdfea
SHA512ea119e3ec7880eceadf89a45a1acfe74c56d1aa137a55f2de19ce870ac5d486a98e205c5aefab4a9a01596a52d4340e5e0671364d635a8cab4d87e3eba7e01ee
-
Filesize
2KB
MD595bd21951ee394a50350d14d6416d0bd
SHA187d29a70179ffc4f11af1e3af224dbd1b34444f4
SHA256544d72ccd7623ec0753776748e2bf8029c4ba0796dc927c8769a1e811e79f467
SHA512b570af99dce4f1129ba2d093a58c80d9263fd170b1cca4837b80ccc32fc173a2647fed75ee09b1b7dbf90f0d2de32e5829196aa330574ea8554c9c849e9a5199
-
Filesize
2KB
MD5ec9432331fdda35133d29ff0f3f37cb8
SHA1844626b0414b74af0c48d7c36ab964009a6a4963
SHA256455971273e7ec9b12f2d5cc45fcf95e9dcca2295295470c1372213c1d1ce50d7
SHA5127da991ac5a754e28278dac13fb7f6056379e39c49cee9bc455631b9f10e48a2a8361b6734ddd86ee1e4a1d64326173c15ea34b73e1b906b39dbae8db3ca811bd
-
Filesize
7KB
MD5fc6c155d5bd75888cbde1006755675c2
SHA1cad6083206bd3db2f336623d891da737898d627f
SHA25604010f0324dbf5f658fd00c9352d525df80dd07f02a7d9324c164c342b93f431
SHA512c44109c57503cd1d2134e82afa93b223c48b5b0761265d4fe3a1299cb8cff06c06081b3d6cdd5df7961ab261bd3b859012f4dca9d14cf10ca1a969abf5d14ea3
-
Filesize
6KB
MD598230f6df9b89e89e2b21bd2e8dcd51a
SHA10d254aec11a4323a4d22c7a048b254966e188e28
SHA25613d40ac6331dce399d5993f17ce676b43af098529358eaa08fdd9d6fa5f70ec0
SHA51201f0fc64dd7e958ca87470c1e027cd1d2190706c940563e7323543f99e192ae2a93ff80dfe890f994d20fbe7e0ad42a0ea010bb1b06ca8a81bee350bdaeb04b6
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5df8d15d55bb50a79cc2cd7874ce2ed22
SHA19ec6bcb56cbbcbd986fef3e92727dab170d58875
SHA256b7f4c2e28f0761acb92122c1a43f579495def045c4fd8ae368239d79d129efe9
SHA5120ab91c4c4d908b607330b2a675d875411a754f38f12319a43bb175c283060f9806fe7c3cf6735231a90bf1729453adb067307ca08e8eca373f2744e0325d6e20