Overview
overview
10Static
static
10JaffaCakes...6d.zip
windows7-x64
1JaffaCakes...6d.zip
windows10-2004-x64
108751be484...2d.dll
windows7-x64
1008751be484...2d.dll
windows10-2004-x64
100a9f79abd4...51.exe
windows7-x64
30a9f79abd4...51.exe
windows10-2004-x64
30di3x.exe
windows7-x64
100di3x.exe
windows10-2004-x64
10104.248.22...A.html
windows7-x64
3104.248.22...A.html
windows10-2004-x64
3104.248.22...d.html
windows7-x64
3104.248.22...d.html
windows10-2004-x64
3104.248.22...r.html
windows7-x64
3104.248.22...r.html
windows10-2004-x64
3104.248.22...g.html
windows7-x64
3104.248.22...g.html
windows10-2004-x64
3104.248.22...9.html
windows7-x64
3104.248.22...9.html
windows10-2004-x64
3104.248.22...ain.js
windows7-x64
3104.248.22...ain.js
windows10-2004-x64
311.html
windows7-x64
311.html
windows10-2004-x64
312.html
windows7-x64
912.html
windows10-2004-x64
34a30275f14...ab.dll
windows7-x64
104a30275f14...ab.dll
windows10-2004-x64
102019-09-02...10.exe
windows7-x64
102019-09-02...10.exe
windows10-2004-x64
102c01b00772...eb.exe
windows7-x64
102c01b00772...eb.exe
windows10-2004-x64
731.exe
windows7-x64
1031.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4abc4e174beea2d801bab1f52a202a1adcdc372443e25a2f1875b90f112ff56d.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4abc4e174beea2d801bab1f52a202a1adcdc372443e25a2f1875b90f112ff56d.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
08751be484e1572995ebb085df1c2c6372084d63a64dce7fab28130d79a6ea2d.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
08751be484e1572995ebb085df1c2c6372084d63a64dce7fab28130d79a6ea2d.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
0a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
0a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
0di3x.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
0di3x.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
104.248.221.3/systemerror-ie-edge/_data_image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAMA/xhBQAA.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
104.248.221.3/systemerror-ie-edge/_data_image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAMA/xhBQAA.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
104.248.221.3/systemerror-ie-edge/dsffddfdfdsawqwq22121sdsd.html
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
104.248.221.3/systemerror-ie-edge/dsffddfdfdsawqwq22121sdsd.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
104.248.221.3/systemerror-ie-edge/img/blur.html
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
104.248.221.3/systemerror-ie-edge/img/blur.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
104.248.221.3/systemerror-ie-edge/img/headshot-bg.html
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
104.248.221.3/systemerror-ie-edge/img/headshot-bg.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
104.248.221.3/systemerror-ie-edge/indexe2c9.html
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
104.248.221.3/systemerror-ie-edge/indexe2c9.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
104.248.221.3/systemerror-ie-edge/js/main.js
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
104.248.221.3/systemerror-ie-edge/js/main.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
11.html
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
11.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
12.html
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
12.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
4a30275f14f80c6e11d5a253d7d004eda98651010e0aa47f744cf4105d1676ab.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
4a30275f14f80c6e11d5a253d7d004eda98651010e0aa47f744cf4105d1676ab.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
2019-09-02_22-41-10.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
2019-09-02_22-41-10.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
2c01b007729230c415420ad641ad92eb.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
2c01b007729230c415420ad641ad92eb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
31.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
31.exe
Resource
win10v2004-20241007-en
General
-
Target
104.248.221.3/systemerror-ie-edge/indexe2c9.html
-
Size
30KB
-
MD5
c3d72f83e398064acdc21509226b47fa
-
SHA1
df3afbd526151107acce3bae7d25f1cf33349b4c
-
SHA256
e8da6f7472b2ce092fddf64bce7ea2960ed63ea92ba4dfbfa93bff5bf7913025
-
SHA512
b77ea23c163d100fcaa4f3ef2020072793fc4605145c13c26302faad6baf4f27a3cb827340eef61b2c154b89ccabe5b8f773c1f34b9f39786fa6979271fffdcd
-
SSDEEP
384:H+51uEhO56OIop2I8NKFWuS6F+TtObFhuw6F+TtOFE31+/VUxfh07oQNI7gW0M:e5fq+bz+oElsVUxfh07ocI7gg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 3532 msedge.exe 3532 msedge.exe 5092 identity_helper.exe 5092 identity_helper.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3532 wrote to memory of 336 3532 msedge.exe 81 PID 3532 wrote to memory of 336 3532 msedge.exe 81 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4800 3532 msedge.exe 82 PID 3532 wrote to memory of 4944 3532 msedge.exe 83 PID 3532 wrote to memory of 4944 3532 msedge.exe 83 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84 PID 3532 wrote to memory of 456 3532 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\104.248.221.3\systemerror-ie-edge\indexe2c9.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffd0c6c46f8,0x7ffd0c6c4708,0x7ffd0c6c47182⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14757477766436194893,15611590641604411888,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,14757477766436194893,15611590641604411888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,14757477766436194893,15611590641604411888,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14757477766436194893,15611590641604411888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14757477766436194893,15611590641604411888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14757477766436194893,15611590641604411888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 /prefetch:82⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14757477766436194893,15611590641604411888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14757477766436194893,15611590641604411888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14757477766436194893,15611590641604411888,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14757477766436194893,15611590641604411888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14757477766436194893,15611590641604411888,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14757477766436194893,15611590641604411888,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2560 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
5KB
MD52bf8c30d4ba84c5bba7538c6af195a8c
SHA195f196528011b6207d48386c4a32c988faf95528
SHA256a639761469609b5e82f469983ddda0bbff92f47cbfd1fd3ec5c85dbca4e226fb
SHA512ae2406bfdfc685e2c440ceaaf06227b3ba582ee1b14c87eb300d848cb709a5138dab47902bef2be1ce515654d874597b9c1a53178216ea7d253151a152e8e5d9
-
Filesize
6KB
MD5e3bab8eb404c4e460046aa2f2c5c4d21
SHA15dd0bfc8f945425d20aac4023c9824d559361b0b
SHA256a8eede10bd4302bc930997f4ca129a2fdf34fa7d3020fc36465b45567ee19aa9
SHA51250c551e0db26483fde48726fa232ae5706b63ab8185221265a2c3531c30bbb67109a92504131485b33b3f363e2367144d228da8d5430a62bc5b3457925d5c7c9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d60133c9198a137b8ba10a859742bcd3
SHA16ba284cd1a54bfb6e1cec2841db7d8e822ca893e
SHA25695bc263f3edc20b98634a1041e1a643cf96a5d282332a39388c5ac4c5eddf865
SHA512b9800b8de57e2e6db17f77d2f8a42f0c069188080b7961679b63ec25c3f8af1ed2bc41e726c13efa861bf1c1ee4d77d85e9ed423c3ead18eb34bf3f2cf5fe0c3