Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
b0db2fa2bfea880e41876dd37e1cff2d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b0db2fa2bfea880e41876dd37e1cff2d_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b0db2fa2bfea880e41876dd37e1cff2d_JaffaCakes118.html
-
Size
301KB
-
MD5
b0db2fa2bfea880e41876dd37e1cff2d
-
SHA1
3ace46d9d2e67ee98d11f60abef149d517fa7be1
-
SHA256
3f57f6ea3ad81203f16da80843eaa7a4b3d63433de698a06f1b26aa1dc2ea6ae
-
SHA512
e5f370a4df464e60ea268d75371f1f113336f75873aa0ef5bd9cbe9a6149576bd057dbb7ece61573d5f1c464c8c15aa7c561f8edfaf70ce7807f7d3acde1ba66
-
SSDEEP
1536:v6+SbTTFZSjT2mNkltM/jVII3IbIre0MtBm+6oF2JLnvbnv9cdZ3B9dE63s770Ju:C+SbTTFxmItCVI26PTQoiTCw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 2080 msedge.exe 2080 msedge.exe 1980 identity_helper.exe 1980 identity_helper.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 4212 2080 msedge.exe 84 PID 2080 wrote to memory of 4212 2080 msedge.exe 84 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 1600 2080 msedge.exe 85 PID 2080 wrote to memory of 2088 2080 msedge.exe 86 PID 2080 wrote to memory of 2088 2080 msedge.exe 86 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87 PID 2080 wrote to memory of 4368 2080 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b0db2fa2bfea880e41876dd37e1cff2d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed0ef46f8,0x7ffed0ef4708,0x7ffed0ef47182⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,17218801847439967816,3204046603099875410,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,17218801847439967816,3204046603099875410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,17218801847439967816,3204046603099875410,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17218801847439967816,3204046603099875410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17218801847439967816,3204046603099875410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17218801847439967816,3204046603099875410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17218801847439967816,3204046603099875410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,17218801847439967816,3204046603099875410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:82⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,17218801847439967816,3204046603099875410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17218801847439967816,3204046603099875410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17218801847439967816,3204046603099875410,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17218801847439967816,3204046603099875410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17218801847439967816,3204046603099875410,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,17218801847439967816,3204046603099875410,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5db570a5ce938d067ff5900b308577b33
SHA131ab06f0539335448632540cd927dd2e75f6cac2
SHA256bab4a751f0dbde8ab52c51c3bdb2da32f43d6894d91f95c0264c0c6ed7d0cbdd
SHA51287a1b1c65371460d4e7398dbc7196f36413bbde401f30b01732163b99d47ab71c3ce4b0e2fe863672e3a7ceadf1c2f3a30abf3beca2a691b141d11357e065f95
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5df5f4a0d3ee3271c1c71d0e3e83ea848
SHA14ad52b407e31f49ab14c64feaed3cf9ea90d2182
SHA2561559cc061e3b63e646bf4734d655f963b0fd5699ca64221d86e8fae9b76ad81b
SHA512c266241234d5017ec00f82a61b4ad9f33772b67a9de90ec9896aa6de592fefface3c592c23b9dcf45eba3543478dee2d52838ac20f15e558ef58a21eb47d6287
-
Filesize
1KB
MD5414ca6e19ab76b0fcab4171e0e5b9012
SHA1a426dd084f95f501dbb8a10fe5d0b0b98b57d125
SHA2566872fb512b86c9c635d4f0a01b1eae884b1e5b6a8df5a69679332c69aa06cc3c
SHA512b8d84d157346570670d8c68500b2ae736c4e9f6d80acdc4d9409eab9cbe9f7bbd62d409b2518f8d36315302ed1d30405816c2105616d99de697d6da062c90ec2
-
Filesize
6KB
MD533452ca628795bf8882dc122e1ae67a6
SHA1ee5535ae462d4ebaa0a628c856aa7dd59adb3e8c
SHA256dcf99f1a1259d421822568f3839e1ecf5f85abef0cf0c62ccdf52c0b135b1546
SHA51216cbc2f41beadf30a7cf9fbee691a4c32ea8ebd9eb7ccbc9e7e5d16db9b62ada33c9e6fd3c19895320df851bb4d76fed11739ff5216f1251cfa22db1c45220a3
-
Filesize
6KB
MD5a1776b77716b2b43bd7a7216ab957663
SHA1c971143bd2d159e61a834ce8dce7d645ebf03dc8
SHA25686d1b77938a080e74700f82a9602db384c4898e71e21f80e2e3b1334f0c9a01f
SHA512cdd9ff4d83b7565e33928c1a3c24e95a1b0ca62751e3f2757d61058882fa9615711799e1d180553dd99b6a86859e090c12045dced5da36151cfb4dafb4e3fea6
-
Filesize
7KB
MD5f9eb168553a147962f41f58a1dc845c4
SHA128498a879c7fbe290508153278f0a3456e62887b
SHA2561304a249733077d0b6e2667f0fb985fec21099d8186a4a9ea8c1a70633a0cd59
SHA5124cd897e47093fa4d2eb6913eb1d66aead79618c9a35c8b9f6ca4b501823363f67ae584d783eda4faefe08466edba1f95c2c1deccfa576a65835c9d7a6319247f
-
Filesize
7KB
MD5affc8452d7397cb27aae19377adfc5a1
SHA11a5a860c0e457e1d64620942636f6ab05e219817
SHA256368318d3c2a915dac08cd8eaec8b1e0bc6b7a45bab77a6d47887edb6296ebb6f
SHA512753f407d16055705a49c206dc5acd9431fbf7048d4270823e482b12bfccc7afd4f0d44d91a2764db5822f7a017a115f9f0c626d7926125c4cd89eb38cc2b3c1e
-
Filesize
704B
MD526bc6e5c9822b23bb5a0aa15806e36bb
SHA10eec0532cdaa1cd485b87b1073b258da673c0468
SHA256c8e9ed80ef6b69ac6c255f21fd92b8c3aba86c06d8bae28ecd42a564d25befa8
SHA5125e35096aa75c92264be45ef503c92840e6e291d5f0b76872ba24359a5f2ef09c7c22f1a906523996581f6dcfa58dcda31c661f88dded0ce554dd30f1e54d9fd0
-
Filesize
203B
MD58ea8c7f5a0d3e0a67400ccb04718c5c1
SHA1ce2ab2bee4250eded310be4627559644526b8b47
SHA256e4f50b0eab459f04b6ae0fddff53fc64329ac6b9303c4d142a1a6ea5ba63377e
SHA512d1add77780781a838a565ee5ee60ed28f19ee8cccf67299cb0e8ed706a3b3560b686c679b3988d1b1d9ca249a3409907916a240e76b7eb80a78b75c15a0c967f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5527f2f4f44cd4e3fc30cd3bc29ec8898
SHA1cb00b35ddc83abd551c990b8528c60dd84982845
SHA256781ff9c4f622c896874cd03eb0cf7089cf69ab356ac3e1ec8687a98325b4644f
SHA51244d4ef1d95fced4edcf6066c5f88f708cdaa5a2052c35f5ea9789917d5f895e77dddfca2a43b16d0ac6a638f842babcb0fd7b8145dd68bb51d51eae5a1ecd314