Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
7d5c4294dd1f6383b3259b1011b42057_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7d5c4294dd1f6383b3259b1011b42057_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7d5c4294dd1f6383b3259b1011b42057_JaffaCakes118.html
-
Size
23KB
-
MD5
7d5c4294dd1f6383b3259b1011b42057
-
SHA1
efc5c6599f3eb710703291b41c0f6c25e9535488
-
SHA256
59b8ceacc52025941a724a10ab351286ebe8e604cd12d0aacb4f7258e12e4a55
-
SHA512
9c6bc985c8967bcd685a96cdfbc533a69871c48f3e45936208ecbf9428f91cea43ff59a25d6c07cdc6ce97fceae95358e5619827fd25f520b3557ce8890e42be
-
SSDEEP
384:w3M+tBb0ack9w/THJyA5ghwSTqEBmoZ37tpBvoUMC2V:w8+ZmLghwSuANoUMC2V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3571316656-3665257725-2415531812-1000\{52E9F68A-0A49-45BD-B96B-B713AF19C694} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5016 msedge.exe 5016 msedge.exe 1712 msedge.exe 1712 msedge.exe 2320 identity_helper.exe 2320 identity_helper.exe 5604 msedge.exe 5604 msedge.exe 5604 msedge.exe 5604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5016 wrote to memory of 2520 5016 msedge.exe 82 PID 5016 wrote to memory of 2520 5016 msedge.exe 82 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 1520 5016 msedge.exe 83 PID 5016 wrote to memory of 5048 5016 msedge.exe 84 PID 5016 wrote to memory of 5048 5016 msedge.exe 84 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85 PID 5016 wrote to memory of 2036 5016 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7d5c4294dd1f6383b3259b1011b42057_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fad346f8,0x7ff9fad34708,0x7ff9fad347182⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1476,3749898799940289777,12633059425068934310,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD592fcef60393eb876a093d0683910486d
SHA1e5df88a411c70b7c030adb25d2da1225e70f5a4b
SHA2562ac0d427dafbd13b04433c7c026b1b6a7192f4c86a6d3f4e7fb03b43fcf91781
SHA5127ab50f23fc4a658670c45dbbe0470277af640adbc55057e366caa4368c3913f87157694955876c4d63ef4b3ddf0790f0d0f3cde77560d246dbf6d62bcfd7156d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD55f3434b9a79e86596a14ad39ddb39a9c
SHA18184adeefae058b0d2582bb185aafa101e996bc4
SHA256ed74c3c18ccdcec4b373738cadab2ca8b7a1ae12a551c9d1e3bca54d098d97af
SHA51214b11f5c74a9f30be11137d2db8808eebc138156fe5777159f2ea339e9d48811c3fbc75a476ab91395d106a5ef4de9d3181db443b210431ce6c09ad012ffb058
-
Filesize
1KB
MD576c1857d2f913e7e1d72e518fa19cbc7
SHA172af2c48958941bf691838cd8f66d53287ea751b
SHA256c9ae8c610d7867e687533286579ffdacb55155969610dbbaa46478809e48580c
SHA512152791f9a602510ce900fe29f0b6dd7e07c01f11066e926fd041ddccd3ee6150994b9e56687dcd2ca0f070b6532bed114afa4a5ff5cef0637d120933a19d8e57
-
Filesize
7KB
MD5989b5c48995a1a152917fae2e1c4d899
SHA15f3c67374a10c9ed6c8ed113740f999f94139725
SHA2560deaaf2e907a0e9fae1222dc1057479dd0e4775bb7b4a0ca9e9d2c6b52b13249
SHA5129389f8f9a46c255995cde33353ae3fd4a4cca63b90481a315d360064bdf4816494110e85ced6e1775bfe180368ab4536294db229d27375bb8d32d5aed2e14bff
-
Filesize
5KB
MD5cdac9788ffac3494965d3ee9f196b9b4
SHA15f2134248f49b44e2709a6e3554cd6674dbf6b14
SHA256773f7ad39d6939917dcb86493ee1a034166c8e8a8305b02763e8cb23b9a0b04f
SHA512e51c05521c1975cdd1dcb70128d910b87ee9f9ccee15c3ba0cbaea96a070d481bfe1c7e27f94961fe1f6fed798e9383fe5ce0a45bb3461125450ae88cb57e1b1
-
Filesize
6KB
MD5f4d546405488e05dcc776f171b4db3b5
SHA1f0f2f7ca77ce87ea8975c24ae71f3a5f9a283f87
SHA2567bb4714a11cdb969e946e482776e39817f9756dc460679917be774c96ed3eee9
SHA51252937d21822721ef31408b29dfa63bddb34b5957455d3416b65896ad25986b355dccade9fd232ad708b330db86d8f96e2debb448a86f76bf4cee8fec8b58dd76
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD55a76e49295a4eb4e3baabdd960ae4114
SHA1dc45c105a33806b478519350e85235a5a0cac554
SHA256a8783a907eb7a58bd1d8c59ab1ea4ac7d78ec606b98b33d962f8c899a691283d
SHA512cc533593da98618d8649e2027fa359300362148bf8d82cfb5dcac584d8b1e2a54bf5021e89d663254469ff430c77ee3a89474d1a0c71a3af59a1db1135c132a8