Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
921f4499b6bb5ef9d4b25342ed4665ca_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
921f4499b6bb5ef9d4b25342ed4665ca_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
921f4499b6bb5ef9d4b25342ed4665ca_JaffaCakes118.html
-
Size
158KB
-
MD5
921f4499b6bb5ef9d4b25342ed4665ca
-
SHA1
6049c1e78200e5d2e6e0106e0afd2837d9e0caaa
-
SHA256
6b4bc62134fba32b29e389fc2708c2889c19ec0913636697552cb00a1c3e0895
-
SHA512
a44102106718239651b70e460baa59f93387c4366c9a27aa759d75826fe4426f4368c7e99637191c381d5d83bf425e27e18f7502043c26ae3760dab10590a7fb
-
SSDEEP
3072:sZBYu4kHbe23J9mPSAt5KgofL+tUZ+S94nAnWhYHTAMO7p:sZBYuRGbLtU0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 1212 msedge.exe 1212 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1212 wrote to memory of 432 1212 msedge.exe 84 PID 1212 wrote to memory of 432 1212 msedge.exe 84 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 3084 1212 msedge.exe 85 PID 1212 wrote to memory of 4344 1212 msedge.exe 86 PID 1212 wrote to memory of 4344 1212 msedge.exe 86 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87 PID 1212 wrote to memory of 812 1212 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\921f4499b6bb5ef9d4b25342ed4665ca_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaef7f46f8,0x7ffaef7f4708,0x7ffaef7f47182⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,14102315909651375769,9292402398927334812,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,14102315909651375769,9292402398927334812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,14102315909651375769,9292402398927334812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14102315909651375769,9292402398927334812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14102315909651375769,9292402398927334812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14102315909651375769,9292402398927334812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14102315909651375769,9292402398927334812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14102315909651375769,9292402398927334812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14102315909651375769,9292402398927334812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14102315909651375769,9292402398927334812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6204 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14102315909651375769,9292402398927334812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,14102315909651375769,9292402398927334812,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
893B
MD5d4ae187b4574036c2d76b6df8a8c1a30
SHA1b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
SHA5121f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
Filesize252B
MD587c763d86582b4bb53f7dfa9376574fa
SHA173983a1908ee8b6671dac85579b1461f1c1b57c7
SHA256f793fafc4ac34ca006de03ef1369e3450d1001fb0753eb1b1c84560b5394d789
SHA512735962b3cfb261989f2925b84338a789b9b5f6fd8a124ae31a712fc8a0ff5f7d6447447757bf0ba43b1c9a87b44578fa6c20e6edfda1cbbff8ca682b7bb2bd06
-
Filesize
10KB
MD5d378d422873674a292163292ba0bca99
SHA1185500f3282860af436501d71d42a636b12c7082
SHA2565d8f5acdab45d658ef5d50fa7152833784e6a5b39e253b39a284175d3a42cb9b
SHA51290f81ba5f4ce5e2258cbcf4e33a6d96e2f579bbcaa1edfed9650e38dfe88d91c823ca37e1fbf09bee326fec6b74d6eb326685ad3fe4d1a28c598e176887da1a4
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
46KB
MD5f871dd44ae8c9e11c5c85c961f8b2ab1
SHA17618910822a0f2639b405e3c0b13faff0431140a
SHA2562ae2564f74716a4e44850d845f0cca255c6c0c3a7dc0c8ee6bfca0212cc394ec
SHA5123b9638f705f83e37c3e0c9db1205b2ac76b96ba72ac56013a6aca6f34a7a9ff3548e8fc67d2b85c9f23f8337f696baa8fab01523fb04b5fd618b130501eed47c
-
Filesize
19KB
MD50f0c9989cbb18447d2f5d954c20ed99f
SHA19ad0fd560c0c478c67cc8f118e363b3a1d1cdb5a
SHA256a43a9e5bbd2d8a8aed070df3b2c799afe064312d6f248c4a498a67c0f9a02720
SHA512ad6a2c60d3e5aab48497169e380d0fa50d7a0fd2bfa0a07313d880afaafd2ff2be7521864ab7ec661866b1ee4309467ef2733a24dba7e0facde8d190739d9fa3
-
Filesize
40KB
MD5fdb3c20664d837757e10d098d2b67192
SHA14e6bbb9f8eb2bac5b50be60b62ca2934e7581de8
SHA2568aecf39b9f8bedce00d59b82ff7997cc3713fa06428a31602f0fe81f59a4b72b
SHA512e3acd534d3f9913d81cca66ca98768e4d2aea230ea648b47284f930262a31e970b827d5c3e9ddd909643fb861b3128ceafdd4cab1211f1b13271a23cf50135ae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD522d435ad4c66f224a8722f7bdf61b2bc
SHA1e85d0225ccb60a7540b87d33cae6ea5613caa3e2
SHA256c5098b88883862ec95538845a45406f619a81d4f3800d834ca6dece0d63b9e36
SHA512c24a5fa49d9e95cb9a90e3fb9a3b0cb9002d83629054a1883bde8b0baef0692df17c0b91935ef1b309607fa86460e215d4d2943cf3547287b1a296da0be9b40d
-
Filesize
5KB
MD5a1a3768453a2051257e8974ab1e0d8cc
SHA177aedf83a012b1c5254bf800096d711d605c1e46
SHA256255c12774fdaa17ec10177716c49d216d84da945d7f1586224e41398ad9f5f9d
SHA51281771e7665f5d84a7faf785436a98a6098ac969807c80f84420186827e3b0218572fe238b43f78be4454679833422d89a621cf0191209fefa8d85365eceb4aeb
-
Filesize
5KB
MD52eff728411610e01f8106b3696428e22
SHA13f763197e19b0ccf8765aea6ed3272f75e01fdda
SHA25612e3b7e7e20d3bd2fdccc865c5d9b513ad55200d34dd407640879dadce9db4d4
SHA5121cd13a6e272678b98d3259a6674391c54cb344d0b3520e29ef4af66d1dcdaa9781f560331eb64c65028fda69f58ee5d40176a0f03fd9833a41eadf6ec5017efd
-
Filesize
6KB
MD587798102b0050e46230fb91fac8d8154
SHA167044db9356371c05ffa69c228cca73929919390
SHA25661e77f874e6a212589ad0680adbf16251a60e8fe263898f0940dd113d1f34492
SHA51244c5c69f8b390d67a230ad52714332a7a0834b43c93ac58612f21f0e0a57ac325fdc96531f877fedef1b35c9fa828c83e4e8a554becbe7eca172e12680b7b014
-
Filesize
8KB
MD51b52f343fd4b75b60c12c164ec2f8f76
SHA1d779413a01ab421ae857c695b1e840bccb345393
SHA2562dde19d50f85ddec8025e385a128a5ecaa93ae19c6311f56ec01e71231476a95
SHA5126ff95e934e4d2e93aad0b379358d95642c33745ce187fe55b106cbb6276587354bc92dab52701e6dde697093e5e1c9a2630fbdd0d1d802f365b5b21e48e2ae2b
-
Filesize
9KB
MD53fbad7eb9ddf496fc8acad5c3408e40c
SHA168491335ea5835d0ddafbc91d848902257630959
SHA25639e25b181d57a39a78c526bfa41f49f0504f57d0e91d73cdee7a4770ab83d644
SHA512c7d79d3d097f3f2b0b2fe4a9cdeeb0d48a772347208d9125b70c7bc172a9efbe6a4722a6c199d388393ac18c1e166b3452ac02865daddbf97afa7c5166426ef4
-
Filesize
1KB
MD566ea39dd330898e080a214e0e17c7d8a
SHA1fa8c45be1dde321cc736e1cf762760890258d90a
SHA256d300f25938af8f6130b3ffe552cdd9180783f43e99579089b8d72a49247ebade
SHA51269e80281db6087ff2c3d8ef1152415d7e2d345cdaa0b1a7230ab007f4a4e87af7fd417afa15733c388ca1c47be8ce277c71fe95fa0a12d4c44ad9200672038e3
-
Filesize
1KB
MD59c5003e1e9b9c7d6b25498e26c90b0a6
SHA18c8a014a78fcdcdd7300d4f7fbbc34a48d8a070b
SHA2561e174b87855efb0e53a4b61f909bea095f54a6d7445bd3a1cbd477e5bc9c4d62
SHA5126cba464fb6823e94d9e6c67e326f2e6a8e56ea131c32addcbdef5c74c61cd7587a9da855091c90627f9d0f5331be388cc865a114ae97fb60ac510c7fd1639861