Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
d9e95cf56607c7919866b9c004f4c404_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d9e95cf56607c7919866b9c004f4c404_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9e95cf56607c7919866b9c004f4c404_JaffaCakes118.html
-
Size
175KB
-
MD5
d9e95cf56607c7919866b9c004f4c404
-
SHA1
8bc515a191642da169cd6f974a2bcf099c84e49a
-
SHA256
59b81bad1f09d1c7bf6d76a36361bd915949090e8f0b0830200993cf336f0c22
-
SHA512
05ca6e9b46006432ec056b223873d4c7486e1ff871320fc1ddaa1c96458eab4b3276dc738794046177ad8ba497dae5028e95e7cae041357ba8928cd9b6b9378b
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3YGNkFsYfBCJisu+aeTH+WK/Lf1/hmnVSV:SOoT3Y/FJBCJiMm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 1152 msedge.exe 1152 msedge.exe 3556 identity_helper.exe 3556 identity_helper.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1152 wrote to memory of 4956 1152 msedge.exe 83 PID 1152 wrote to memory of 4956 1152 msedge.exe 83 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 4888 1152 msedge.exe 86 PID 1152 wrote to memory of 3252 1152 msedge.exe 87 PID 1152 wrote to memory of 3252 1152 msedge.exe 87 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88 PID 1152 wrote to memory of 4960 1152 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d9e95cf56607c7919866b9c004f4c404_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff914d546f8,0x7ff914d54708,0x7ff914d547182⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16739808706374616369,9327914163276284795,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
20KB
MD5715c79e5f50f4530260c4456cd414d72
SHA1b8f156341cdef9b668d4a820b06fbb1e4eb48584
SHA256d1918937db9a519cacc80b9ee812eaeebffee72782dcf7a189022909046164f2
SHA5128fee1f9df28e7ec04a63bc85f5e7988fc1de0c94b905c58277ef00bfaf645e3f7359d9405bd726e420cebe898b687335e6d36e17a5c740aa774e9e3d249dfef6
-
Filesize
47KB
MD5213af7ac1aa72e2c0c316743695b7cd0
SHA1c93bf2de82958073a23b3a495356118ef718cecf
SHA256f5680671f5dc330f962eb3de4164654e2c17284ac3a109f687ddabf104e25ce4
SHA512d0e11f42a046682805d18a0a133df1c8c4272b94117de503dd4992c34f93e516b7decbf77496f45768aeb1a95f1493f74f5ff732e9b42efa6bff1b47e9b0c1b8
-
Filesize
243B
MD5cc8df997b98609534b443fd137d682d7
SHA12b87cdcd74a8e7ece8c187fe07e19b6389c2cb1a
SHA2564101bf58cd2a47fd447caf7efb3db33b21f9343f7d67d2ff0f74f036c15e4768
SHA512063413a227a9e52ca35c7393a83a5bd8b1c349a5b71a32570ebfa2b4a5ddb95c75189444593524be8e5f2b0fb9989a92e6fcf54bda70da34d49dc560b8707282
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5e922b04c9bd42cb5badb41d0b63f186e
SHA100bd1e694576e93368ce7c058e563e45870e19a6
SHA256513eb3918ab551847eb1c9783f7c73cdd8ab3f66dffbf86050f833e48985ad3c
SHA51229b41717d5b5378698544faa1b9b923257f293db62244e1ead3d6dbfbfeb765c40128257bbd7058ded36e98016e50b8bd1529d75a7260602243f95ae1b8f525b
-
Filesize
2KB
MD5e7c783dae33fdedc06a63f0ca5892720
SHA1679a9ce34d0508c3d0477c81ab070117b34c699f
SHA2568eb18c4c5d3f7ca681d233f6d464ec0c51fda21c81e6e156dd2992cbc020e0d7
SHA5125770a27e442344d65f1815a454d8e03a72e00e0bc79b83772a388a58152acc3c05bcb0a07129779e0e5c0d73b0a2f87d46e05bf28a17852c4e660a47e460da2c
-
Filesize
2KB
MD5678262a138a085aae713adfcbaa67274
SHA18bfd84f3dff7401c1eb1682c5e1dbc2efcd511fb
SHA2562882a9ea4ef83dac6c36569907c07c64fbe1ed3e77ccc0912b389d606e8b24b5
SHA5125b3abc31924a1739d9716f7638f25bbef2083805226ea0792692a411cacf5139cadd5c665b28c067f1da0f3176457f7194f4fef34f0b7f338f69ed70ec5470f1
-
Filesize
5KB
MD598c41a7f3a5cd1a688e7a2f97dd53a67
SHA120984ecb19fd115df0fab7e5d9c57c0c2cbd58c3
SHA25631e530529736eb4749705c29832b726a9fcc1cc1abdcd6aaa851bb05a786f476
SHA512a50861bdd0dcecd6bb18ff3062a062ad52464532675e54c05b85e903b9d97865ca92de41466f34893aa7d2f3ac2b4516ca805baaa378523c161e286213f9d60c
-
Filesize
7KB
MD5ef52d093d4cf8e0dda57b129e6dfa166
SHA14897a02e4c6dc77a3170ae19fba11a5eb0363dae
SHA256f519d402f5454a11c9d057e18cfa67de25fbe8704e804e1a1da3bc1d23192525
SHA512aeaea928d3b2773f3b2fa5cb8554280b61d0d7f5dca0e5e492418cba689d6d70b799ec59b35d7dd3b33fb754a084a48d40878e0b9d6077d2b5a21521dab5242e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d742f5fcc28f969864d02a3c2fd80f2b
SHA1a79200476d706d2abf2e40310f5b8de2a12dab57
SHA2560436aad06e0e707d15955207610bf5651cbdfa5aaf722c20b600efdae79f6f8b
SHA512a8c575ee731fbe5be22c85224d24181b3e2ecf69476421665809557316f65dd2348af99d4efb61fd6473b7d9c1f0385cee7ebb11cdc7733c86cf8924323386d8