Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
705385682ddaf84b898f3dd1299e4bd1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
705385682ddaf84b898f3dd1299e4bd1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
705385682ddaf84b898f3dd1299e4bd1_JaffaCakes118.html
-
Size
45KB
-
MD5
705385682ddaf84b898f3dd1299e4bd1
-
SHA1
2afc65c6d5c0a22705cbaf53d2c75c76ffc5d50f
-
SHA256
3c7ff97304a3cb2391e97c8fd9b365065a61faa15f3678a6559ce907d8e87d31
-
SHA512
726989cfcc777d5f10ed99b88a2719761e33f1f2f1c1564d5be997fcba2581a187fa9ecce6dec969005fde12855af108b99c819a78eaa4e1d677b1bd34889cbd
-
SSDEEP
768:v6oa+gpaEWlyHdfqlIrLLJzO9od4h8eG+yKIDpkCpm7Ttf029gMG9iE:v6oaZsyHZLtood4hDryK2lpmtfSf9t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 624 msedge.exe 624 msedge.exe 3312 msedge.exe 3312 msedge.exe 4584 identity_helper.exe 4584 identity_helper.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3312 wrote to memory of 924 3312 msedge.exe 82 PID 3312 wrote to memory of 924 3312 msedge.exe 82 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 672 3312 msedge.exe 83 PID 3312 wrote to memory of 624 3312 msedge.exe 84 PID 3312 wrote to memory of 624 3312 msedge.exe 84 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85 PID 3312 wrote to memory of 2344 3312 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\705385682ddaf84b898f3dd1299e4bd1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe86fc46f8,0x7ffe86fc4708,0x7ffe86fc47182⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1736 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2024 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6432 /prefetch:82⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2272 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6437074950200588311,8652103609780038008,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD506f81dcfea6bd791ccb11af243b7295a
SHA160c851ff82c239d55ad821d245b7670cfb4f79c6
SHA2568b5e1e1f625b9fd42a00b94db3c6ace07b63a2f0f04c5507a5b0753877c0822b
SHA512cea24f2ae13a0523239ef3267107055de1d7d71db250e627f0b7e7ea130019c4e4241c573fdf9f6729abcf1a30c8930c93ea1bf78c8222b5c4596dbbc9816ada
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD58c1e6436f6a23e4a51b2f99e78ea34bf
SHA1d0041b313672120ff4f11396bedfd2eb4ce598ba
SHA25609723d44811eb6700a2ad80316b64da9dbb949b9bbac2a332a4d286ecf36771e
SHA512aaad7a2f20e81ba158c88483105ff0eb4aca04ce3f7968de1f6e034dec8525f2d58ea180f2c2edb68301c3957041f0b9500f8c2ea0c6a6095e7b75ea20dac3a7
-
Filesize
1KB
MD58ac086d6c8d2eac3196b3e8b94714983
SHA1f7b36b684e0aca9b32e7ee451175c81dcaf57dca
SHA256b889acca43683a2dd469ab6554e71400b2731c394cac5d416397c822ff9b0625
SHA512265a7a52900d61dfdd94a689053d046e422875c5e621f3dbc57f1c1b56ad1acf6f94f77aec24b9fd6e63a98ec6ad94db058eb434e95cae115a9bceb1280b2d8c
-
Filesize
1KB
MD50e0c625a40a46bbaf31972ae6e50cd72
SHA1dd8dca8c8e048f27c824a04f4c065d0cc1dc6477
SHA256e4a6c1b20f4dbda173b1996aff32b05a7c91413887d7af5e681726b11a2fbf15
SHA512684dce79808429c2c24245f14507bbcd6b7b7b55659f875f33e02ce86cb023bfc03c40620b4d826fab2c4d668bde17d4b797c012168fa214d15ad4bebf9ea98e
-
Filesize
6KB
MD50f1f8a50588d76d03c720d2c85449691
SHA19ac1e0b360ad7575dc6cb0649f816cb33126f77d
SHA256ab40f37fb551a0c49a7b88379c8c2a69b8793c871e4f9d8ae6dc3920a38326eb
SHA512d5ea8cc3dfdbb0caada790fad3ea79b85dda59d81362eea6d17dddb2a3c646b3d36dc8f4ef7d7057244aea5112afb57347e581f5ca99620386d76ce662dd8aad
-
Filesize
5KB
MD5dc280c82c5f8dab425a03bea65e2ba21
SHA18cc61a2331b56ccb75ab1c3c4fa1ce791b1ba0b1
SHA25605e9ff8ba7fc8cd7b8366b6a6db5fb42b64e2bb6519e73ac8c34aee8ce76ee51
SHA5120ad1f6ec8e5cbcebd10b600c19e1f1e49b0319bdfc0e0f29aa305b1a610ebe230b23525c38e8f03a96d19a2348141c2ef148de6fbbdd56dd8a05da3f3d7301f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c5657869-10ee-43be-991b-f0195228a7f7.tmp
Filesize6KB
MD55f173e4cb3ee3a7f12fabda4038e44d4
SHA15938bb72228f6d2ce336a7668f6b3b443bf84db1
SHA2568f2d791b9989cc408114661a1ad709359857398998016e3614f2c269760c0bc1
SHA512790bf8596c67387f0a457a1c21a619bc1ddee87284b9e90a5f4053816c3d5b84d4e7ceda43c3f9e8cf85c2ae88f7842a12c8d4ae2aac3f65909703ae6b388e82
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59937b372ee308c1a68cf05b5c98bca46
SHA1aa98e4d42533280131b37347d2ccb170cdb08ffe
SHA2568360a176dabbf106b338cabed880466614e67ba29b611a5996e2a3149cb50e94
SHA512e8be45f14556c9537d3da6c7549a5baca173da1fc260187373d74f238118d88914580609d7fa5c2c56d71e58edacb47d7549f0e73518bb0c4b3be496e4228f46