Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
4d38f0150189047023b4600cd4e0f152_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4d38f0150189047023b4600cd4e0f152_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4d38f0150189047023b4600cd4e0f152_JaffaCakes118.html
-
Size
31KB
-
MD5
4d38f0150189047023b4600cd4e0f152
-
SHA1
eec60d54fac109ce97345808683ebe6ca1a8dcf4
-
SHA256
f9bd6ea8abf2828ec0e4ac528afadc5c6db41cda4a52cb554beaf8264a2ee684
-
SHA512
bc089c1957a504bd6ebf98d5754b14d1e9e8956d9d33f9a4c2e9f6f312159bc78bede403daf6d2462ad39f9b8498a35df48a7f72759617f71fcb9709d02e41ab
-
SSDEEP
768:4DNIFGKVtK5b55545T5knereegeeeweeeVeeeevotSbKtEutHi5D5D5a54525J5k:aNIFGCK5b55545T5knereegeeeweeeVn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 4412 msedge.exe 4412 msedge.exe 3700 identity_helper.exe 3700 identity_helper.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 2816 4412 msedge.exe 83 PID 4412 wrote to memory of 2816 4412 msedge.exe 83 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1060 4412 msedge.exe 84 PID 4412 wrote to memory of 1416 4412 msedge.exe 85 PID 4412 wrote to memory of 1416 4412 msedge.exe 85 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86 PID 4412 wrote to memory of 1368 4412 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4d38f0150189047023b4600cd4e0f152_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd90b646f8,0x7ffd90b64708,0x7ffd90b647182⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,17979899087488192533,9966364523471967749,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,17979899087488192533,9966364523471967749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,17979899087488192533,9966364523471967749,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17979899087488192533,9966364523471967749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17979899087488192533,9966364523471967749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17979899087488192533,9966364523471967749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17979899087488192533,9966364523471967749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17979899087488192533,9966364523471967749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17979899087488192533,9966364523471967749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,17979899087488192533,9966364523471967749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3968 /prefetch:82⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,17979899087488192533,9966364523471967749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17979899087488192533,9966364523471967749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17979899087488192533,9966364523471967749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,17979899087488192533,9966364523471967749,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD530201d91554ef280a5a98750a66c31e1
SHA19aeedfa4e84463d0b686e830f816b0c488cf5876
SHA256ab7c8f9017898bf1312c20087bc8dcf8aecac7f00aa8716f206c7276ead05ce2
SHA51274ee2cddd19c494bc8afdf44c867b5f5759c342136fc6a925a13bc943967ef6ff0ff00e2c0179ad0568ca110e9e89769b93692a7ccc015285369f5359f028f12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD523416e3dddfe787e0fdb037a561e4782
SHA1a6fd0fb2b899c5a9972b69f13c9d974784532c2c
SHA256084f7907352ffe1f7961baf69f0695fb8486f18e6bf5973f144d90dcf7c47b20
SHA5126d7aa6828b7633c400688b80f3cc34533b1e81df7b55066227b66f65ee2c6449a27b38a986c8d71df6689db382aa6eaf145da8b482131c6ab4cdead4ad6b6ed3
-
Filesize
444B
MD588dd9269eaf93358207fc559b659cd30
SHA1d35743d0cb0d7abe040768222bfdda56ad5e88c9
SHA256a8f9bbee5d37392469323853a4d8330027ff3e364c8f412d00464131da77ae63
SHA51282af211bfb4077fb84b8ecc62b4b2a3281fc213ee4fd56cc59bce47615f32224364bee56ba2f232003b90b92ed8e5b2a353bab4d4c97d5987603f50ed03f6ee8
-
Filesize
475B
MD5d3e19265baa6b842c29c2b65dcbe0543
SHA1dc31a509622891ad438ae5a19c330738f37a4803
SHA25642470e6e55ed6a7eafa1e50a618a5164ed58d865d787ca649fce0456eb01d28f
SHA512df3044615452e9ac48bfc0b086d1a2726a9de135b5852a171f8b5de8828a7d3641f4137141a3c0de9d4df69a2ec1639d601f9982f0b85aa5b7ce831c3eaeabd7
-
Filesize
5KB
MD5cc231c81cae8c9637915a4a8128ee6ab
SHA1dcd405a6dd15817a3281185b371735f6a0c065ee
SHA25672a4de780a9785bee8128deaa7b47b89e38d014769063a5c98cc42c73562cb40
SHA5123b3b2ed2e9a4c3b0408512fa1d068c153af9d520a525a59c70b8c98b65bb2919b1b6dda1d6aae7fc4f1aa8e9d3f95dd8519524626e6b55591d5006b40c95a548
-
Filesize
6KB
MD524df8f3815776e7217ace3f464bb920e
SHA1e42341dc945cb645a5c854678dc2ddb8bdef2d35
SHA25693292e75f4a41764da76ca256211988f6f7d318cc6e2fdb176e48ca8ed4e788d
SHA51219d1292ae00da37ebcf54055c91dd2125b870f5ccf07d3ba4d7a6926388792fe360446982452e136982e18d3814530b8201fb2c44746908e4bd0a9e37e019394
-
Filesize
6KB
MD5af386e06e5be727ac37575ee85bd634c
SHA101dd085b6d6acdf193989f38415dab883c96e99e
SHA256c7a021ee1b140215a24e80bb2a2c005b9752b50b41a9e3f65fadbd0b63689285
SHA512c3b40d6bfdfd3db78c8cd6dd713ca8d57b37ee395a3b2ca531fbe02eff7253164cb506cc5ca9ca7cfbff8710d1ebc8ed933b80a6cab0422461874377441b5877
-
Filesize
371B
MD5f0abefd0cecb2c7ebfce8ea714197f86
SHA1c8ed5f0d5d3989b9d35747d733fe6534e5dc9d1c
SHA256d5f5c791eb63963ec55c57d73ade29c6fee8d3d2cd7c9f645df11cad477a98ca
SHA512cd654bf72917c4cbf29c004c85e475400c4613a6803507e4a68b3ed76c2064bc69905a274d0affda4dec29402cb178801e4220cc759ae22a3de13d25b027fcfb
-
Filesize
371B
MD5ebd0c895f647eea2211e87c501d27bcd
SHA18ec8a2343d02e3f36c78333d64675a12ebd89594
SHA256d5b8f238b78e6a39002ead57ef13028bf0cda750d9271a3d91d4dd7a1263b9ce
SHA5128df10228dc9c82518c71c653a4376b010bfb9ca92b603622bb3ad7c0c48edde41d6dd034186e8480788ae03ede100aef43305bca06317130f7ca00b2420e27cb
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5b3339719e88f729d31574e06269ca4a2
SHA1abe7e7bc3e51eacb3bfb0e579abadeead8d819c5
SHA256fdda102a62423e81b4ddb7974dca39093029154b5bdf9a1361e5993b74914eb7
SHA512876afbba50327b3d1f9dfca397bef6c11317eeeb3d89e2d812bce4c96c2f0d3fbcd945ae2d7fc33052522f7da849a239f3df6330898aca43b16a43a51a8f0adf