Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2024 20:49
Static task
static1
Behavioral task
behavioral1
Sample
0cd02c8bb11508917c4ae263bbfb681a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0cd02c8bb11508917c4ae263bbfb681a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0cd02c8bb11508917c4ae263bbfb681a_JaffaCakes118.html
-
Size
100KB
-
MD5
0cd02c8bb11508917c4ae263bbfb681a
-
SHA1
a19c274b4a947c661cdbcd0d1e2293302dbe68a5
-
SHA256
f765ffdd35fc03f63ccdd1fbe58c961ace34b270f5b1adbb031543ce8e9fd7ed
-
SHA512
ca1b51f4912624555cb05c119db84d4a0b2c8187e4e03f98a4b94ba13e9b23f5cdea0d054728fee5d415eed7043a363312dc8291a12043ecea196ddeb80480e4
-
SSDEEP
768:Zo/skdUdVJK5zo0iwju5NHx4u5ckaZ7ZOA/J9P909n+BZfgu4qQeQzUBckWzYZ/a:ZrFbkVv/BWu4qQeFBN7Z/+WQ537
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4592 msedge.exe 4592 msedge.exe 2700 msedge.exe 2700 msedge.exe 624 identity_helper.exe 624 identity_helper.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2700 wrote to memory of 1684 2700 msedge.exe 83 PID 2700 wrote to memory of 1684 2700 msedge.exe 83 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4048 2700 msedge.exe 84 PID 2700 wrote to memory of 4592 2700 msedge.exe 85 PID 2700 wrote to memory of 4592 2700 msedge.exe 85 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86 PID 2700 wrote to memory of 688 2700 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0cd02c8bb11508917c4ae263bbfb681a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda6f346f8,0x7ffda6f34708,0x7ffda6f347182⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,5128106245119183244,9171754866774925130,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,5128106245119183244,9171754866774925130,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,5128106245119183244,9171754866774925130,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5128106245119183244,9171754866774925130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5128106245119183244,9171754866774925130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5128106245119183244,9171754866774925130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,5128106245119183244,9171754866774925130,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,5128106245119183244,9171754866774925130,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5128106245119183244,9171754866774925130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5128106245119183244,9171754866774925130,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5128106245119183244,9171754866774925130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5128106245119183244,9171754866774925130,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2068 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,5128106245119183244,9171754866774925130,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
40KB
MD55c6915af5fc1a2f3ade5d21d864d650a
SHA17459091b99d32474141b9a324bed7c2831353d5b
SHA2561c0c57ffa35d64b3606683725c13ae67e58456253e99030e444d6bbd46d6d698
SHA512ca59484c79701a9e1c7c57d1c6047eb79c746354c081f6a19bcdac9479626255e09b9b357d9d1cac830c386ea32443cf677b2964bed8b2a55e3670bcf7ddb16a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5e3122a8279bb12cb9696cdb5176862b3
SHA14ccc3c0b31257ff8e965d9bc92a760192fcbc69d
SHA2560baee770b3abefc6328874267ec9d3601c99b402278f1411d238032fe8132ff2
SHA512cd9b9e0bfb21b618e82ef37c78d16bd290e65036b1e53b5b2edf336f7735dd2c9d559f99b8c85ce3dde8db44dea034840f3ac53c53438e9937ec03e5fee086c7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5846711b8a51f952513c9dfe1377062a4
SHA137ecd8c993022b4498f226f92b7b2979b956f4b2
SHA256aeb29060817fcbbabb5124aa5caa69c4ee86c21b63ec899ed3b015472d292157
SHA512250e5b1262bc2ee6ad4be605086b9162ff3fdc1553a5f0db323c4ce61b4ed27d1018d218fc8999df222d86fbffaf5de20177096526eb6a30256fe30ed2f21e5a
-
Filesize
2KB
MD5f8518341512cc9147d6fa640d9f2a58a
SHA1c1d53bbd82c43196dec13a3b4a6c2b2397eda9b8
SHA25699b73e2cb91b6243b299224d6830b8b970fe529e3b5cf21d717b772610fc5beb
SHA512c34df82d3b5108b90678f0ad91b9446534d7567f7e176df0c1caed7cda5a9fdf67e8462911a0f7f790096f8894b7da801522ec4cea8e9c15b5b14dfb2a121845
-
Filesize
2KB
MD500c8428c8d1efc087bd53462d292e701
SHA1de5ca33525d07cc81c898a3db82eecbbff2f0a1d
SHA256671ac0d3359d12ae486e2d247bb255cdab63d0091bb5ab2dbe04e918518fb948
SHA512f00de399e36322634c7fe8f39a2cb8a9a9a6e82dc075375e3df40ce315530df67afa44be72313947e243dd23cf86ed37762fdc99768a4aea8fad43dd494a603b
-
Filesize
6KB
MD5c7ec78facafae2f2b31b0c0a2db24728
SHA1be925ff92893c011db3a5994e48979cf38f345ee
SHA25661e241e30bfd8a55f0840587600c45df25eb6e312ce7a9a82d47984d1ec1b9b8
SHA5127e9b11040bbc011f321af3f3cefecca66be1b2bbb087268323eae6a0c953cdffbf638cca310f539e68356aaa71b84012f341cc18778294de82ab0134dbbff2fe
-
Filesize
7KB
MD5456b113729670ad0ddb5a13c0e410175
SHA177728a54dcb2b00bd85adc5a0a5dd20f183fba96
SHA25666457ce476f6c912f81932c60de610e069dd8c710c5433fec1bd7c629d6070c8
SHA51297cd8192dfca26f14030ba98b3569231a63ae36d36bc4a7088aa97d24aef1104499b8614b5ea166ff40cac090b2d596f944551a0f6052c8a243dec3d9f57e3b4
-
Filesize
7KB
MD577a2e4dd6babd2f51f43fc6476371e7a
SHA1806d78531135b1281e17d72183d11858002ca49e
SHA25681bc2f6d3e80e563c076f0fe75d7c75cacb5ed39dcf511161cd6633c0ed43a49
SHA5129e43ed6ed54c952c11bf1ee380acadb9913beed9a13b638be4e36c4a4cf453fc3593e977cad3f420ce26babedc298e50d9a01756f79c15a4e973709c9fdd2cab
-
Filesize
538B
MD5a729d717c520bf05382b8b9cc87cbad8
SHA1727682a7c509d2924d1c4f4eda42e013d64aca11
SHA2561caa5a627a41ab6b20738a8482c9c5ebb0530013bfd66593829eec83138a0669
SHA512f2111c9cfd173e4e722013772e08ec7ae4e73d71370646f72205b4852f9e4b76d11aa0b55201dedd32a5f040df03cb67ce06477c86efb720d4a31507c32274a9
-
Filesize
538B
MD584392b81b859c9c9d9073ed0914a7996
SHA1e7387e965d946c97ed78e67428989db7e0ab7473
SHA256ba9ef2ba967378384558117c3978b4927d7299046e6b54eb5151a369b1b783d9
SHA512fbf0cbc75ac2a4af34d35c944ff2a4d59c203f86015285e3c26080dcd5c47288941fe89364c7dc0e906e313e27728f83b1813b954e7f4466f8cd850e034765c0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5127650c9a31faa45baf097596b2a85b5
SHA148e96e6ef7d42fa436d52959f1d24fe5bf2d308c
SHA25639a9006f1e1457d92937c9796e174b78a96d5199f06a43a0603cf245b19cd431
SHA51271ca9d5be42381904b3034b187f687e4c20011aa86cbe1ff535b3adef671a54206c0e56dad3d21fb59b5b14c47f66930e5b82ffc896b930fc7aca5e3c5971d41