Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 04:50
Static task
static1
Behavioral task
behavioral1
Sample
32cf27e38296908618d8ae450358ae78_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
32cf27e38296908618d8ae450358ae78_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
32cf27e38296908618d8ae450358ae78_JaffaCakes118.html
-
Size
52KB
-
MD5
32cf27e38296908618d8ae450358ae78
-
SHA1
ab9fe561a593b5556f16fe2046dc13aea5537537
-
SHA256
9257834a98b26ac589e063039ed1bb259241ba8553335ca053e73a2fe5d94a39
-
SHA512
5aef0fa2cf335759ce3edcf1598fad6293259ad968d09a518b624c95c37bc5e6e343a14577c086c7fc388bafe7fdd6734e496d68623af4ed1a46af59bc19b703
-
SSDEEP
1536:Cild0rpiYzBYjFTE+ftL6gLjK3ON19rCX7CesErsFRNnczG:CEiXz251LJSOf9rCX7CeBsXNnczG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3392 msedge.exe 3392 msedge.exe 3104 msedge.exe 3104 msedge.exe 2280 identity_helper.exe 2280 identity_helper.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 4836 3104 msedge.exe 82 PID 3104 wrote to memory of 4836 3104 msedge.exe 82 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 1948 3104 msedge.exe 83 PID 3104 wrote to memory of 3392 3104 msedge.exe 84 PID 3104 wrote to memory of 3392 3104 msedge.exe 84 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85 PID 3104 wrote to memory of 2560 3104 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\32cf27e38296908618d8ae450358ae78_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff824c446f8,0x7ff824c44708,0x7ff824c447182⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6320 /prefetch:82⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,67546794350188707,11129486908630868263,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
Filesize
240B
MD5eb4275b7236620f9c16a2e111bccd131
SHA17bd5f5fd9f522bd7a09738826f935914ac96b906
SHA256cd294f868b628faaed89cd2d24b1b735e97f1e3b5ba2a4b07bd9f1ac8122e097
SHA51225a44ee475ab5cb50c39de011ede8623ed2392b3130201033aaa522ab3d1ea326a6d4068ba875180d15f52b37368699c3873e68b5ca89be0f46aed1fac8fa19f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD54dd9696b4889422dfe01ddaa3f143ac2
SHA1872fed76ad9350eff1be634fcab1735a3c41779c
SHA25631643fffe011725d1b31a57a53358c336ddd4aa81e7f2aa0419ffd59c8f07443
SHA51295cd11a50445fc2ad5196046eba93210ca6b421474ade63c6a961962c0384bf08983f9f2a41931773834a504ddb16784cd5d8b2d1c1c8309e8c6eb5b3b4a1ac5
-
Filesize
2KB
MD57d9219928d7645c5e207d7ce62c9af89
SHA1a95eceb3721064bb7ac3bb1d362da7221e94af61
SHA2567b954a7bff78d49808444982cb5f37cff80a637ac3b5068f54a44459f1b03906
SHA512304229dde2b87347b5356c3ebb671def1a57cd2613b857913aa35564b415c8de91834b2bd66c9f7049e262a1675f7c37fc83cbd38931c5be6623c9521a0d4f65
-
Filesize
8KB
MD57f2ea0e044c01a77954bee0ecb69d0f7
SHA19c5a9e30d520922c12bc935345f8a65d3c42391e
SHA256c7fdbcb55f92134daedc8dcbde7afee087ac276c14dc96da0ea310fc84be86e1
SHA51226efef3f4c12a1bb4cb5a4161398fda9c939a01c033314d917c80dab847ed645a1b36c53f66b6c886d56c4b633eb1e8c1970087dd991cb561e98b052f5b73880
-
Filesize
6KB
MD50e184f6a6cccc84f8d84c9f2f025c93b
SHA18bf03a64c53edd6a0ecd7115cf9b62f274aae700
SHA256b0621e30554a002580cabed8f7995d511de17a16f58884fcf224653dcbaa756a
SHA512713d4d351e3edc9da825b06dbb94f55b6fc907b96dc002ef885a6df00711f0da010ead1b29ffdc6ea914f6341b7852557512ebc6d757e28313ae21dbafbed685
-
Filesize
8KB
MD5cc9638ee58acccd604f957d1c537d28a
SHA18e9f685b9b6db80cbfc9e7f791fad46801530006
SHA2567d1b2e4d92b4e0e5afc3635aac6d03fced9cea4b9d720a3ce6417f96f272bdc1
SHA512a0d74e10f8da80f0b8bbd34ad9f762e3a5ad12738e493023e98190f6e50cbc7ca85ff8d0f22915042dd91b14cc8b3c71b9abd93aba242492b62db58d5e26b887
-
Filesize
8KB
MD5da103682df1e4af429b6169ab1df38ea
SHA12e6d1979e8ba956b730e174218b1f5a7c66568bc
SHA256b83d244af538a17b7f053fd2a348879257bb085733e0a3e43d06a62b99acc059
SHA512e43a301663a6a217dfbbc94f645e0cfccd5320c0540baab3b655e001af3cb83663b00ec8b37b0b924517d74a682d7b010895390f278ac3d643899d94c49c5304
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5625abd9b2f73bdb703ad9364fcc21d5b
SHA1fc34bdd354baaf383935442511ff814ea7b2c194
SHA2569a27ca8e1b02c0c1aba8757fbf8023536247d93c286fb7ce3986044e18496b31
SHA5127f71af510526ed98906c950f92f0130e0257cce65fa0efb405dce60c3cf9316d1f1e0ff2c2aded2a6de8d82faba39edf6e977b1cab5a0d9d04f063e98727d294