Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
a18ab1db311556611b1ca259f2340122_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a18ab1db311556611b1ca259f2340122_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a18ab1db311556611b1ca259f2340122_JaffaCakes118.html
-
Size
133KB
-
MD5
a18ab1db311556611b1ca259f2340122
-
SHA1
ce9615de01992dc830fcba08564170b7477c54d2
-
SHA256
b8fc27a308ae7279dd380b6539a20a060b5b01f34d651f9c31768e95bd5ccedf
-
SHA512
ea8ee3326af08a886e46ddc2787944b7d6e2501fa09d91f0b9a64f69bb2079d998d9cef989b653a9ca5f98713ef18e41ef77b370f64a7f913fb5c401f574206f
-
SSDEEP
3072:sh5idprA/9/JtgHtlHbNZhulELW6EwQMT/r0/3Nka4tq0ym+Tea/LaJuZtzjRhN:sWdprA/9/JtgHtlQeWET/r0/3Nka4tq7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 1632 msedge.exe 1632 msedge.exe 884 identity_helper.exe 884 identity_helper.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 3872 1632 msedge.exe 82 PID 1632 wrote to memory of 3872 1632 msedge.exe 82 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 2940 1632 msedge.exe 84 PID 1632 wrote to memory of 4896 1632 msedge.exe 85 PID 1632 wrote to memory of 4896 1632 msedge.exe 85 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86 PID 1632 wrote to memory of 3612 1632 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a18ab1db311556611b1ca259f2340122_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9c4646f8,0x7ffd9c464708,0x7ffd9c4647182⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2600 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3659646199446073221,7567340164188210015,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5f3b08e24829084c48a6f445680168fe3
SHA16bdee4e7b750848c0d938c300aa53c9216f57a01
SHA2562fcb2d38a19c597e856e5347ea478bd00092a86ba0b3f7f97f44bda77928f047
SHA512df25688037d36bf6322b440593b36cc3ddba3a6e98bec27da24434ef209e24d34c5a85bd7d92377c88675aa50905214b34be8c6d3e3d8db8faf77df744f0ce87
-
Filesize
3KB
MD50c860ff7bb2d6a206fad1e3667f8800c
SHA17d1e7c8cb86da7cc1b85b4853410f92b3070669e
SHA256580a167a8f9e559190c6f6cedf0713c8bf0bdd8d62022c1c532201870e467773
SHA512469aecd907840e0778ba69cec43ecdfcd14d93841077cf3f6df6ceed51919abf783b8eeef37ca0221b9d6877eae195fbd25b8985bf3bd2177d1ddda40fed8369
-
Filesize
6KB
MD5428799bb21e14b128ff2c868346a91d7
SHA17291a6e340d87eff15e71a97116713fe3ee8da46
SHA2567949e204b6f5b629c305488659e78b14045175aee7fa705de0c26896e183dfc4
SHA5121c89760814d23d5b1d7f76582c8322ab6588ae547e189241b6c18891a5273702c3c4d4031780597c914046df633029f28f7ca59c264d4eb677b830ba6671f3df
-
Filesize
7KB
MD571726f6dc5850c2a673275d71276bf1c
SHA136e732cbff0986146af67429f2ea96373cd7e716
SHA256fd2ba76b753357abf19d93aabc61d12c96de106b7c2ed95fabd4578884c04991
SHA512dbbab0f4f98c91c6edf3f5fcb745f990dfbae88fffc8c59510c8fe950310509b7695a6042766e6b45a881642306baa667579ac6691b464a244a59d1eea697b38
-
Filesize
6KB
MD5321d1b350e7e8dbb401351b7a1e749d2
SHA1c79d6237b3a5617e7ce71616d028493b2638b320
SHA2565dc42e45790038ab1d836b540754c5ab3ca7a624e248468b18215c425e7ccd77
SHA5120afd9645c2b5a28d651fc97da2a3b1b5b839aeb50dd0b03e5e579a5d402429b717389f86c9847ed72b00c36a61e1cb70e0f85de9dbd1a50b148aed9046d799b3
-
Filesize
1KB
MD5662161d9127ee474194dbfd56becba11
SHA18af978af086066ee3869d12b22cf879e634652b6
SHA25641ffbfb3db0e5ea3620180dec2edd145e02b8bed0cf9fea889b1265c0fad4422
SHA512f270cf5a34a42cdde23912ab05bd42d1e5e01d9e6af0ebef6d4f39f70892c717182dd5689114208e2719dbf09837fc9c4c5de8c28fd9085f85f8f91ceaa353f3
-
Filesize
203B
MD54e11083d2742f630958a543511a355b8
SHA17765813ed6046c5eb6aa894b5f57c9715817bcab
SHA256c092659a99cd125c2724fd94d7d55ec3c5896e1138576750c1c2079e6f0374b2
SHA5125de695a6b421065838746a416ed8e24d0119319c8d7d3416b1fb2f9da4724f9478c94c2c83acd3fe662c7c65895698fa27e16ae2f512997dfa394babb05bb47a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD51caffa48592b6e6f6c90e93adbcff85a
SHA1c5c0569967a2fea335b41a18b2a9a9280aceea18
SHA25617fa5995b264347a7bdc950c81505a3f260a6c8f6b0e8bb7c7eb766b10c321f0
SHA5125fd4d2cd96847394bb6f293e2ff66bf1f24595ed059106a33af4a8b39e45a5e80442e463f50963d9cdf8d1b9db99c6472638e2e0988f140677a98cddd208587f