Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 18:49
Static task
static1
Behavioral task
behavioral1
Sample
de2c71f234305c8908e97f61d6043b7f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de2c71f234305c8908e97f61d6043b7f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
de2c71f234305c8908e97f61d6043b7f_JaffaCakes118.html
-
Size
113KB
-
MD5
de2c71f234305c8908e97f61d6043b7f
-
SHA1
971dd701fe9c949f5d303ded2081317f1ab48083
-
SHA256
923882897185988e67034900d6325160061d458dfa12e2368b7e38d61c62547b
-
SHA512
e08cd0e2e7ab16595ee2f28d5d5ea2aa2a65cbf3d7246b0cf9e42e07f0feced9ec14c0fe0c100c6f04160c381f7a461850869ce04eac5ad06b73b531e5946230
-
SSDEEP
3072:GeHEaVHh80d52leTaobDhjqodOhqWtBuoARHYB:GeHEaVHh8k24aZx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 2328 msedge.exe 2328 msedge.exe 2440 identity_helper.exe 2440 identity_helper.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 3576 2328 msedge.exe 82 PID 2328 wrote to memory of 3576 2328 msedge.exe 82 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 2636 2328 msedge.exe 83 PID 2328 wrote to memory of 4416 2328 msedge.exe 84 PID 2328 wrote to memory of 4416 2328 msedge.exe 84 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85 PID 2328 wrote to memory of 3128 2328 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\de2c71f234305c8908e97f61d6043b7f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0xe4,0x7ff9264246f8,0x7ff926424708,0x7ff9264247182⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,1245987055719654657,11059568392797162288,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,1245987055719654657,11059568392797162288,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,1245987055719654657,11059568392797162288,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1245987055719654657,11059568392797162288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1245987055719654657,11059568392797162288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1245987055719654657,11059568392797162288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1245987055719654657,11059568392797162288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1245987055719654657,11059568392797162288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1245987055719654657,11059568392797162288,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,1245987055719654657,11059568392797162288,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6424 /prefetch:82⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,1245987055719654657,11059568392797162288,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1245987055719654657,11059568392797162288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6384 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1245987055719654657,11059568392797162288,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,1245987055719654657,11059568392797162288,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6248 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
20KB
MD54b3121a05808b99aa6e0cc12924f77db
SHA1ee5805bb76c384d1e1667aea2976bd2f4f94c7cc
SHA256e4fea32bac89d9ad34b13a25b0b4da1321920b2c6be2cabb75ff91bf6109152c
SHA5129b83d55691b41d2a45a542d163c1b6a47208969720ec1fd15233f29ddcef2243e79895cfcb008767f91b3d1cf3a6288248e8b1ec50027eb96db04cde56cb2605
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD55ad672f5e6934c48f5f719d503d8ef1e
SHA17c0c7e7afcc0ea988635dfd1f73ccfceddce0323
SHA256d7d12ffaa80e284446f147bee0797ed02928e3a269f125b9fc4516e036e497d5
SHA512d009da43a641c5c9fb43d1cb5e7fff131fa3b901d732a343d297b8371dee464c8778a3c52016a759c8541d708304a4c9bec71f8497dfefdf0fbf0d0e05b04c5c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5d742a5f8bde70b113cfca01ba4e8519f
SHA1c64064c3ec398bcd7733a6d32498d5339b15a623
SHA256ad4b44b273b089a23b94a2d995f9cdc1b180ee448888014f97303a0f488fe276
SHA512816c9f57b7cb065871b2af4c924b61d727367b523825a4af4dc9d0e8cf2f12b87bfb33e0b05cc00f94942678c7a912502a9fc649e0ba159922edd407daef1af8
-
Filesize
1KB
MD554d41e3202956c74d927584278b25fbb
SHA1c32ee444ef00a0aff27a075c79068522ac6092c8
SHA256bd5f3350008527f5f24dc95188d21630454d2b1c26d5d2eb476ebdc4f4b875f8
SHA51238e7a1d7568e030588d1980f67c4fe14f7a469c69e98cd8f00225fa966511dac62fbe448882a4bcfe486b1c0ceadea9df3e787af3a0531c923ab63a9b84aebee
-
Filesize
7KB
MD5c3cff714a2ce8689ee2dccb8571af91d
SHA19b48e775de1957fc1b71dfcb9d1f322d05190b61
SHA2562aa085117103e4ff29f4f667529b53f98525c575d56e59689272231c67bd5391
SHA5127a2686e52a69d194e227b6eb5c879d182a4b560cb160c92552173a6ff1aee49aa560681f369f7c31925d3d37b042bf85d2d5f3806208694e7b53fb9642ca57d4
-
Filesize
5KB
MD5a0092ebe2d8f06b1a9b04429a0e5cfd3
SHA1f0d4b83388018c4e3ad308a53b73d82d7ea2f359
SHA25638c374986a704fe08814645bc7387d7fcfecfe2dbd9aa2164de82d72f80bd841
SHA512422003938215353420e365aed2814fa77cfc113411ac306e5def562b106edd32cb981e3ed62e1ec89c610ecd2453eb164b5000919a7707c34044ac004339f580
-
Filesize
7KB
MD5ec8ee070a3050d46610c867e745dafb6
SHA1e5ea198827e66d333bc1b2be261a6e31a14c2113
SHA256b43c67d55e68efb4bb881acf517de621d11a5582405574b373b26b6551c8f3df
SHA5123cabe975d17d2558d174cf5fe1e903b03be31149242b058caaebbd88dc3f27a967a32f7573a46da59e5b574cecaeb85eb2300ebee32db69c3d4d4ef2edc46a3e
-
Filesize
6KB
MD5cc77e7fedca849b83a0a5b8857b7c20e
SHA1d7bfd6ce1f60b1c2dc75ebc75b60455d07f3a45a
SHA256f506f27107d84c769c2f639c2b0f3d2faa5b8d5c43cd00841cc2c685381b099c
SHA512e0cf405637250525f1e7a8bcb429cc9a9c4a03b20e530987118387f2bad9b5e31ccc18326863c4203753de18368c79211e23ec4a009d48b00214a688875b7e00
-
Filesize
7KB
MD5f788ee4bcebc509957a46f794a356e60
SHA1497559661a63326aea4f2aefb6ab4e825db992b5
SHA256d31bf2697eb2ecf96492dd7fc7d5550490ccafee5512040c6a02f3a1f87ee9a2
SHA51284cc4d3ac491e57807e195105c2455cd47da74ec1d68fe55cdbd3fc8fc08f9fb749d5413376e2421e8bd9d6c1f91d02f4b3be50b24dc1c8e68de6bfb06deee68
-
Filesize
706B
MD524e15dcce2c3f8903c66b75583138915
SHA103eb05bf9aba0446f302a3a23fcca32b7dcbadb7
SHA256961482c7f28b0415a127760093e1f15fc59cff30b6e0cc18e7ec5c043bf53694
SHA512184449f47fb75557e632d13ef44fc534ad8871bd08c75463ef9bbdc675a1cf21456db73e6023b6f13d4409f1f594037509ac6bdcefaf421e79bf89be98252a14
-
Filesize
539B
MD5ba63d8e341202dd3c7ad1593296796dc
SHA1f944b68b90a00dbb733bd3feb350e6223f7b59c3
SHA256bffc1abe9b93964109f0426265a69401b9784f5c008920ae232effaa82ee0d55
SHA5121a809cae83991ae1dacbc51994291fb455ce1a235f5757e0eb6683e07f68869382bb2c952074260a8cf9a6aff73004617f7ef2a93360994e2545a0deb5dcc1cd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5061548a2698a05cab03e4768d24ae50e
SHA12c5d657f61397c541b65e24b45de8d40154ffc5f
SHA256ecc6cc1e445a95fa6a2c4898d48696de2ae86aa4148706700ab1a3b7ab43ab0f
SHA5125368f9d20047f0a0dafddfab7f7418fa6b368e2be1f33a48bc6dc0b80c5c25468392b203759150c6eec9846333b3a53cca6b8e6c5a72833951250756976fad27