Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 07:58
Static task
static1
Behavioral task
behavioral1
Sample
5dfac0a9d26fc34975a81d7173f63177_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5dfac0a9d26fc34975a81d7173f63177_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5dfac0a9d26fc34975a81d7173f63177_JaffaCakes118.html
-
Size
175KB
-
MD5
5dfac0a9d26fc34975a81d7173f63177
-
SHA1
f49be1fb64caeba0be70e12432365df591cf0dcb
-
SHA256
89c6369e26800659cb7a7bf43974d6b945b07ead6fd92c72b173230814559d1b
-
SHA512
882580ed92b13637ae61c4c6161fb4506389152598da42bb81e20fea1c2b638a38b7841032115ab62f97a7c76f04b719d5e028a0f52f87b66a047133a7996b08
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS31GNkFNYfBCJisY+aeTH+WK/Lf1/hmnVSV:SOoT31/FIBCJiSm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3068 msedge.exe 3068 msedge.exe 2008 identity_helper.exe 2008 identity_helper.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 3028 3068 msedge.exe 82 PID 3068 wrote to memory of 3028 3068 msedge.exe 82 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 4492 3068 msedge.exe 83 PID 3068 wrote to memory of 3104 3068 msedge.exe 84 PID 3068 wrote to memory of 3104 3068 msedge.exe 84 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85 PID 3068 wrote to memory of 3980 3068 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5dfac0a9d26fc34975a81d7173f63177_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffefd5946f8,0x7ffefd594708,0x7ffefd5947182⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:82⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,6962188049043198051,16832921467311069302,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD517b80bc6b985c8da5c1ec02aec215f46
SHA1f221397c3aea04523240d8117bcd3874931bc334
SHA2562be41d504f0144c3e40a46c63b2cc68cb55979ccae5fcc9858e8e7cc5da92f96
SHA512c0c68b7dbabfc0aa1650a99e5ecbe4c987c1b503d6ef246b0c311de82d689f632d989b3e501e7ca2d5b944d39588f33055194643003bb4af8e29cb410ad4f81e
-
Filesize
2KB
MD568fc0f8a8d40fa4f23a0e7cc62c04525
SHA1130b50f4e1c5afb12c2cffef935333f1fc5bbdf6
SHA2569045d0209a860bbc591f6f1f2037ecb997c5fd2ccea0cc00eb6f2e23f3065660
SHA5129f54672a425c1cd4ddd1f568da6cd1c8bc7d6ecdfc9233071a2517f9d18679c9215013638a5a7f5a5005b22882d960b00c174c07c60fa0775ae6a3871939cc20
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD53f48bb759197f93824b215fd064c98bd
SHA1e8f7c460f4e3ea6edd9fdd8fdc5332c9493574cb
SHA256b5c1a599c1e3992c4d69af3f35f1972042c692810a162ea9b52d9b3818ae6874
SHA51267532eb7a0f1d157c6d8d2b5095124a51726d5b369cddc37d7dd29399ea469bb9e5d781611434080152f13986430402b29289a000e85156b0a54509410806877
-
Filesize
7KB
MD5642653e23efeac85433e8ee2b09638a6
SHA11df28cfa1c6081ae102d6bccb6d034460dc2650f
SHA2565d5f509fb10053bd34d4ac495c5de65d78d807322afeddffcec053ab49df50d1
SHA5125514a807490e8374486b3ee09219b4e76f0b368a42b3ff642452aa55185cf5b4e8a59b142036ee4bf2edc03ec23109d6dfdfa8a2c5ccec5ff1fa964955ddbd28
-
Filesize
5KB
MD567987eaf27239ccb9b24551b1430831d
SHA19ee488ddc2bdcc8ee0236bb53349a0a1723ec3bf
SHA2569b9986070d32c7851345ed2c52b82ab3d4ce89c94349a7807b4916838b996929
SHA512f65237d3a56136d3182bcf44ce3428a819f74d9e3b8996718d3f5eedea1255a55fc8c3136298312fe8c9b6e7dd25623e275a95381ea97b5428b75e4e3df16ec9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5d0a884331c82d204762298a55f221ceb
SHA1b830099180e6893c1c554ca46aa4280d0d7292b7
SHA256e831c2ea1dfbda85ee8f52fe8c258dc935125ee109c6db5d4b6e03386f245485
SHA5126c52c447657645db072cb58bffadfe11f4071b431c8e7e07580d9ff0671c0e11324d37260473f4e52ef65bc5660a5e9f3bbc5e648dd28c250c14f72e219ba820