Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
47ea401ae8d188b6f54101c44e9b3371_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
47ea401ae8d188b6f54101c44e9b3371_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
47ea401ae8d188b6f54101c44e9b3371_JaffaCakes118.html
-
Size
48KB
-
MD5
47ea401ae8d188b6f54101c44e9b3371
-
SHA1
76d522a43b854c68f34ef0dbe2c2cd71e13b5715
-
SHA256
e70f500d829f700a9f5ba3015f0ce534678c907ca9c4ef72d1d1fe20b267cdbd
-
SHA512
44e4fdf921d48220cb79d4a6ac06b27b1688c5bc962a593c9a65cf454fa294394f2b41468c941d4ec5ed746ebad06b6a25aac528157fa0874366dfa5ba0f8512
-
SSDEEP
1536:NKKwK5lrWIt71Ai8l0E5F3papyCmfEYT4N6LR0f:NKKwK5lyIt+l0IF3papyPfEY9LR0f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 1020 msedge.exe 1020 msedge.exe 4324 identity_helper.exe 4324 identity_helper.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1020 wrote to memory of 4932 1020 msedge.exe 81 PID 1020 wrote to memory of 4932 1020 msedge.exe 81 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 4152 1020 msedge.exe 82 PID 1020 wrote to memory of 2248 1020 msedge.exe 83 PID 1020 wrote to memory of 2248 1020 msedge.exe 83 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84 PID 1020 wrote to memory of 3640 1020 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\47ea401ae8d188b6f54101c44e9b3371_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb2aa46f8,0x7ffbb2aa4708,0x7ffbb2aa47182⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3131743603804914147,109932465193481116,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5fc391e4-b39e-49be-944c-e65ead6691fd.tmp
Filesize7KB
MD51e44c95da77b0ba63af227f4c91fe328
SHA152b47b16792b7bfd67296bdbfa2196d36b51d5b0
SHA256dbd8467a0c0062cf5b051076e455b6346b31bcc18a5b41e30fc1525c91f34b6c
SHA512657f2e8f33a3b9216929e4a70df46bde98a5ccbfeb8ebe16e2e277e2fc1eaf3a8e94059370c76302311288d59fd2c1d0e39ec031e56de62ea6d0ec1498591d39
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5034ffeb014bf980c12035e6c7b309312
SHA184835a23a9d5594fe91c0e8f9f985128d089b057
SHA25674f39c802d739c7f4f5287aede50d77ca0388ed01869b9f226a29d47e8310dfc
SHA512fbdfb323e4b7fece5f3beffd1f8f56bdbc0dd247406e8d9afeb748e26a2b0499475535d010b540a36dc964794a4b4c369fea5c38683e4bf283f7793349255fc6
-
Filesize
1KB
MD51ab9e18feb0865b64a703c9bfd8142e5
SHA169bec86ed44b7e410d68e2a28de5059af690ee49
SHA2567ce0875214b93d96e837d5bb32957c2dde0735d50028d974cf19edb3b9729d59
SHA512dc1995112be853de06c41bac3888385392f43abf0e375d2fa197138a9c4c97c9f47976fc8b051313861b250d7a37b90fca9f6e1e634fa34f5650d575c4a59cc9
-
Filesize
6KB
MD5908f3830fb06c5dbf2a6eb59246e6287
SHA10e75f7014efc224760e57ef30d99b1c6145ffa9e
SHA256b8f060ab4067f2e2843af067f88dfee4dddfd39fc40cd215418c41445704893e
SHA5124ce1c5a921a0ce47dcb3afef4326cf27500b85ceb3462f38a972c35e514e386d35d113a1caca47151f63ab98c76327c71658792bb9ef2cb36030828364cd31cb
-
Filesize
7KB
MD5dda763a36e216a467c43d1e306f00cbd
SHA17ab1aac19fa313a77602f7a449ca7fdc1b2bb382
SHA2563e2f4e4a1d648cb8f9e67fcc8f09fd64164c9fd02b984edb351a74fdf08d1283
SHA512ec7e3def4065d899a4cbfc09d2cb4ebae09515500454e7f19334a6a521f41b0fe1ea7b63f9c51de22dba8c56fd9f3c42215830c99088bdf7879cfb7f96ccdeff
-
Filesize
370B
MD54209dfdead165925d0b1077e29c33cbb
SHA16fe58292e72200896953402188fcac79ba027ac8
SHA25657466e04902a3ee497e89e9ffbfca0104e5758576872d06c25429d62b1414652
SHA51204c8fc50ba19d8bcf9616df695e3bcb05395f4e8b3b133b2ebfa643ea96e5045b24364ef2d283ec486fb00d1254c74a526c3b9636524584e921bd23ed182944b
-
Filesize
370B
MD53ac28b2e74a80b8ba9f33897da753a59
SHA19a8d8c9737a0cee7fe38bb9eb1af9cb30995c3a1
SHA256d1dcec46b1ee59d0ba3ffca3bf24343ac468e188fc88cbdc7112227829f3c0b7
SHA512bec3b608431a53e10a001b583ed941c9d982a0053f7e78932601622c798e9968aa67c4cbf5698b99c74c58e7aad80b08330878739fbe61e2743c893491a71c72
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5290865d36c6e726104d96d1e6dd536d0
SHA1c3f631472a368892a1a5ca91b9ed67c38fbbbc39
SHA256b16f1607133caa5013959d8f466a86caebf9cfe4688f0032500e68a67735a40c
SHA5122102f797f6e954596968a0ab4d47e9da48f9a2de22df3a12e62e3a4b23210ce5089bd0125374a1730370d30eb3dca689fd021e7e71e73721faeceb18b51a6bfd