Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
79fc4c2aadd6a9c7d1c1acc45ff41763_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
79fc4c2aadd6a9c7d1c1acc45ff41763_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
79fc4c2aadd6a9c7d1c1acc45ff41763_JaffaCakes118.html
-
Size
61KB
-
MD5
79fc4c2aadd6a9c7d1c1acc45ff41763
-
SHA1
a443598ac8fcc2997380ddc1b4be1589a538d4d1
-
SHA256
859495ff63ef8cf7f81ba1a5f37fbc96082a8dc2cdbe85b37089a3d21820cc0f
-
SHA512
2ec81afebda35ee50e8b8a6ec11641c4cdf4bdc0661c8f5071d68c8a0575997a1ad55fd394074f401ccb954a60b051bfe02021c5dc61faa72639e4b6687152f0
-
SSDEEP
768:GVHgOriWNcaSoagG0bJZ8jDNOKXaCeVtsBWFlXVFwMtzzIq29NY8:L/CbJ+OKctzg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 1688 msedge.exe 1688 msedge.exe 1976 identity_helper.exe 1976 identity_helper.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 4472 1688 msedge.exe 82 PID 1688 wrote to memory of 4472 1688 msedge.exe 82 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2248 1688 msedge.exe 83 PID 1688 wrote to memory of 2900 1688 msedge.exe 84 PID 1688 wrote to memory of 2900 1688 msedge.exe 84 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85 PID 1688 wrote to memory of 1800 1688 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\79fc4c2aadd6a9c7d1c1acc45ff41763_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff86ae746f8,0x7ff86ae74708,0x7ff86ae747182⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6440 /prefetch:82⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17413440802936427546,17898874628447525988,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4520 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5c6e525faf995e0d0e7e49107eb2913f2
SHA1165db3abcd628bb96151f6958f71e6dc23c90661
SHA256d4d1034bd251646b63607c0cf22eef26e8d06a686fc8b13d92b8a473aab953d2
SHA512a30d61d76bcdf8ec7a8bfe2bf65d539266b1d74249808e3329aa6cce2bf4eefe4083e6b30d39a179a850ea9b348341df807b0a344d26b080516d1b67f9d19d72
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD56f0af006332b1c84e929a961ff1fa5ce
SHA1fc1c43c1417132b68f55857f1e30b0441701dd65
SHA256d2f4c3585845c27463fca52a5b8b89e29283690da55077d22390519445ab8464
SHA5125c499ccc542746b0799e6022e98341d5f0090290b4249e5fb2146886823bc1f1b813d022631af14df5f8e2aaba8d137087e0c1ac2885d315fa47e52a4ad1e39e
-
Filesize
1KB
MD5bb10231fb29c4d8e24108055c677981e
SHA14a2581431751f184fcaaa2666e71a4bf4ad5efe0
SHA25659bfbc77d729268e557f2f6526d8605a3aff84d0742907a735a607ac58fd162c
SHA51215372edc49762ba5ab00934768b776a258d2a067016cb6627ff2c742679f5e6078b07779f09ed38b169ab716cc022407cd7d3b7494c2ed1a1e55bedd99c312e2
-
Filesize
6KB
MD5f97e843b65c916eec47c5f7b9c2cc0ae
SHA180a45d1b4964cb1a5cf30344e242055f4e43c914
SHA256c84b5878e940d1acbc1f4a708f17967746a8b4b3fd288a63a53244e1cc78e7ff
SHA5122f04e603d2ee9568536c2c3f244ce0c14bf4112b1e9c530750d6ce389d6579984f6d666f656b22a9ed94953cf0f685da52e7c50e99b0a4fce70ef47cde8b96b9
-
Filesize
5KB
MD591b9e59f5ce08012fe4810aa5152ac26
SHA1f433202dffcd1bfe532c406eee4491360eba6325
SHA2566175f3472552e198ac5005532d22d83c8e9d7d8e91032fc876f1638f56a28920
SHA512516af37563ced26d17d8be8d5d40acfd13fc57c10bb04b727322cddfe0df81d08dd500c72d068cf76ee5ce30bff1ba5b4c78af48ae4fac2b0bcfcbc5d9f535e7
-
Filesize
7KB
MD5ba8a0d9a30ce66af71bb3c46856cbf18
SHA1b653e18fef89360bcbef6b46ddfff20554eb47e3
SHA25634288fd647a7bb384cbd0892528390df958b32286d5c1204addbec52d959b101
SHA5127c4732cf6dc9495aafb140620c1b033159c3726b1e78bf4c8d919811b42ada2b5f4943e9ac6a99f975a02c35bda14cf727723c3bfdcfa6c5ddb34647007bf6f5
-
Filesize
7KB
MD5f7b0e45382f3bde8fed4d68cd5e3f368
SHA147ddcb97b4095a6032cbe5a3350a8e9b9c43d54b
SHA2563d9ff88c300c238c26efc04ab9dcc409cdfec66bcf02f435d1eea2d11fd71b6c
SHA512b837a4d30a8932a60784cf7ee54918e17a5e7b6ea6df37494f0abff0da88941b119fee044d261484a923b725721267d9b67cd4d8a120c21f97b624f0f907d4f6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a5c8467519ff95838d4e3bec7e380c51
SHA1f6f09bd553b89e3ae8a9d6120fcacda9718416cc
SHA256e0b914bba02eec340fb8b1d2d9113a6f3aeb0039bcf936112277233e73d68666
SHA512d077acd16f6869d0767345b05f27f3ac5b8f474a43eb7d8e936b08617818e3486d898dce53d74f2554c80173573c653b197195ec4a6c8d1de6808cb0701cce98