Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
47f36fec68192b33854c739da44072b2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
47f36fec68192b33854c739da44072b2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
47f36fec68192b33854c739da44072b2_JaffaCakes118.html
-
Size
54KB
-
MD5
47f36fec68192b33854c739da44072b2
-
SHA1
86f307fb128aa0d09ee1cd4e7797f41d2161a7cf
-
SHA256
b88db92d71cdf1c0836d34693abc53599afcabda2c626c4f8e6e8c6bd5839b2b
-
SHA512
eaf95602d55bb34e1ba8c8b5e4ea666deeaac9f9dba8935f8d81c77520b65129f2499114212f03486038a0545e791404477e3611d55fd2f5cd6cbca37186e03c
-
SSDEEP
768:OgOriWNcaSoagGjPgYjupCwlg6XgOjbKBVIcreYD7H4J1QDwN/5hi2vOZ:Z/1PgFXgOjb84j/5hG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4248 msedge.exe 4248 msedge.exe 3452 msedge.exe 3452 msedge.exe 4060 identity_helper.exe 4060 identity_helper.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3452 wrote to memory of 4784 3452 msedge.exe 82 PID 3452 wrote to memory of 4784 3452 msedge.exe 82 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 556 3452 msedge.exe 83 PID 3452 wrote to memory of 4248 3452 msedge.exe 84 PID 3452 wrote to memory of 4248 3452 msedge.exe 84 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85 PID 3452 wrote to memory of 1720 3452 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\47f36fec68192b33854c739da44072b2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff089646f8,0x7fff08964708,0x7fff089647182⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,5137992827545969821,18278328204242388709,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5564 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
64KB
MD563e5a0b45632b3dde3694ffcaf0e3f7a
SHA1923736d0cdc308331d5cfaa0ea159bfedc83d53f
SHA256889109910477919b3457416e7764bcd0add19fd959848253026125c7c35c43db
SHA5125b886c4b5122d61f0209ede748aa84445c9388cf38813316c41b3dbd2308216e88394d9a45cfc27113c0cf3bc93b9c37d808f6d3c67888244c176ee095d42259
-
Filesize
240B
MD520f579bac73e6305b83a2f1a6a6a1b26
SHA16ceb15e50ef3faee50fe12da2701ae4541a89216
SHA256866976d144a7a61e5168dec369d4a16ddd698f03411683c2542e5f1a0fb1358b
SHA51289975e5cab1a4832261e17bb00b1ccf90677ca07ba2a5a0bb2bc968f07f2ca0d198a4f82fcec6d88e473a9173a0dd986b44e82f38ab22df50404362cdbae62b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5bd0a165b4cb3a7ae596e354be2237065
SHA105433c9191d843f7b69a88f848390f64b2206f3d
SHA256201715cecd1871bab6fc2ad7d2156b70c37fc1b9f5f069e536d0131a7f9e6be8
SHA5123516a420e739c4fdc5864f8190a4a46913341ee6c6d493225b4b591c93d43b145bde060d82b61154f289cb747d75183f9d770526ce835b0952eb513b83c50521
-
Filesize
1KB
MD5d5e0475e652916f24fc261c8d806f3a9
SHA1490822f1055a246c70121b8c878502d00e7c9578
SHA25686985cef28a75e4b65ba0023376660decce24829180df830ab3fb7fb1d6097eb
SHA512134eee3b0733402c96c8c453f5643d9d801ac69139c9626221a96df24aff862e19931e4f5b1eab0e163105d0c1321d6c371c577d32f23b53ce25f8f9ee563a1c
-
Filesize
7KB
MD5e071e97886da3a96ad0215c2a005543d
SHA1e0ea781573734a7b16c855566e56fe93984b3cec
SHA25634d9e02a4e7d22d63e28c048f5aaa332199f2f3bdc9778025007abcd27dde1a6
SHA512a2ea1868a316f68605c39164ece190ec6fde66f4bc89488af06f57702846df6cbcf3d02f8cac66a9c07ded63e9ad681b4b42fb8c98404495a4dec3c1694d49f8
-
Filesize
6KB
MD5962265d132cd44c24417f7d3b23f941f
SHA12c75d3996dfaeafe67ac344b3882c5e4b2d782e9
SHA2565aec239792407d324669e31458d6d6512eebb570e722cd7920715b0e27213f11
SHA51276450527d0aa21890500fe9df65b4c214b9655f3e0b48540bfe513fc532606611125347434946d5c35480f8d26faa940e1acfd52e83b2c347034208e541ab435
-
Filesize
7KB
MD585a743b73e2c843bf34366883948afd2
SHA1fb61cc3433c70549bde2fbcfefbdc5459387704c
SHA256f5e4ca24c5d25195b26dd2f42f42f9933bae9f20a7bc2c748da3f125d5d78220
SHA512e0335da1efe1ca36840a5c0ce6ae63dd6dc42bb69a5c5f21f0c0ce89521c32d386798a864221e1bd4ca6a8dcc5d12176b07641801783ab9151ace5422ae75c7c
-
Filesize
7KB
MD5c03f82504c9c06ce0e61cad0308e652f
SHA12db3cbd786f543b0c0e13f84d67a166c1ff8cdf4
SHA256185e585ea32b0cc16147f5ec8a0843f2539de1c3dfd2a1a5244f7aacb701226a
SHA512ba6aceaa3275683889117c1f0fe1a476e82056e157fe275cb06276d2e68ba74e508fc8e8391a2e8ca8a0104263edd866f6b37c54d39ae9b1dc180b6d7211e0f5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD50ee3de1331200d7db3ff33a98d996bca
SHA1bc808f2332e4d60f66fb367672ee52787d1a3819
SHA256834772457255603adb38e38a1c08e4b5381af1dd61f88ad21f191a7e89a569d3
SHA51215dfc6edd602ca01485e39807f2b487553178d199d0b7783537917915786e536698b1d4462072efa2710ecad6b855375becd706992fd00a81878ab9913e6de15