Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240708-en -
resource tags
arch:x64arch:x86image:win10v2004-20240708-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
2e974f12c64652ad0fd8cbfb3c3e3e36_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e974f12c64652ad0fd8cbfb3c3e3e36_JaffaCakes118.html
Resource
win10v2004-20240708-en
General
-
Target
2e974f12c64652ad0fd8cbfb3c3e3e36_JaffaCakes118.html
-
Size
20KB
-
MD5
2e974f12c64652ad0fd8cbfb3c3e3e36
-
SHA1
cf8e6d3e81fa79bb621fa959e47e298da8f557cc
-
SHA256
964c55887c542a768740a4ae1c957f9c6ca186d4630a61cb2d6b82da2a269a23
-
SHA512
d0359b0ce15581e641276e565a3310778f7829c6a6c05cb3cb0171847dd3970acda2b983367d23f50edd3a5f5e2d31b93b2f6122bd59569a190bf3c4a5c09fa5
-
SSDEEP
384:wu44cG4NawI42IHgMfN63oNlrI4T3ocJL+2AaddURBDGJ2:wac7k/42IpcYZI4T3ouLKTz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 2168 msedge.exe 2168 msedge.exe 3744 identity_helper.exe 3744 identity_helper.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 4960 2168 msedge.exe 81 PID 2168 wrote to memory of 4960 2168 msedge.exe 81 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 5104 2168 msedge.exe 85 PID 2168 wrote to memory of 3492 2168 msedge.exe 86 PID 2168 wrote to memory of 3492 2168 msedge.exe 86 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87 PID 2168 wrote to memory of 3624 2168 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2e974f12c64652ad0fd8cbfb3c3e3e36_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde77a46f8,0x7ffde77a4708,0x7ffde77a47182⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6548 /prefetch:82⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6528 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,12036267972427677887,12268519421689982685,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD597f8be9c465b0ed67c2415868506c354
SHA1cdb221d6debcf55615d3b5f30796e32065046dd9
SHA256b606a1ee10b65eb9077e7d2f3b34a0d7a1ed6a4802a169fe55449c975332ee02
SHA512a0fe0ed30624658127316873137f4fc488a5916005e5e3f1f55b7d6442b54010c08d7037b94d0cf3c3316b1bb4acf91bad9e64ee6d15302e3cdd62bb18730542
-
Filesize
152B
MD56ae84fc1e66cbbb7e9d28b0e12d64550
SHA1100430bb653c896c11b94ac0bf2297a389ea5ad8
SHA256856a9c0ac8c29f738a3501b6bd007fd8cbbac211e461b91f4caff52dd41da75c
SHA5127fe7a8639d96118b843e67a6a6d397271b181dc6b049e6f7de77bee9c9214690b1b7f73164f7e463e117406dc978334ea02397fd639140598f60f89c6aaddbe8
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5953a3671233387881d3ca7156b954b81
SHA13b9ad9d67b5dc3d047fe491c7926494b2da86f99
SHA2567a343218e676d660ca06148863fb77b2fa3945542f46cfd510bf012e426cd279
SHA5121b1b4dc9367493f33dfb3623595e513f4f94378441f141ce1c502414b6b444a1cd1bc659b72ad1d9ce86f92ee32c48a582965bd430e11a15ad8822ec4512f0d7
-
Filesize
2KB
MD59f3b26ac74f7d2338f4478a638a0cb01
SHA14a5e4ca7f943c2cb263e9e343479cad9d2dfe507
SHA256caa6efd6540a8a17b1d65d0b9a426845325bf9bc515fd5aa7996fe841df90b8b
SHA51216344140fe24816bd603732a933834245bc4cc782268b5febc23ad34ed8be8add9037863ef631aaa5399141c24826129823a4e0c6016c6d6aecd67d6a11335b8
-
Filesize
6KB
MD5eee690950396bb38d813fd4381d771e2
SHA1efc1433c23751736f78c142141e0591ce8b6be60
SHA256e77eb9d5a5f963f0b8c372d282c63f296fda2dd883d46e0f00fb56c7b46cff1a
SHA51259286cf1d25fe80b18484d7cc7270725056b7c6a984582b837949d83ea06c57dfacfd19da299233df26c5f5f0ead8647f024da9e00f95ff68fbeb59a38299880
-
Filesize
6KB
MD5b7f514bfc9688b5c0c6fd61b560624c7
SHA1876a4e79f09cb84005256d0ef74513e0cb5a72d6
SHA256701027ce1ee6403ab2e09e713322df8003573cec4a6f7f183f140ee01d1f6f9b
SHA512047f4a43ef0609d0489ce821bb5ff327b3e22ad6576cdb51115289d25927dc74bd89c6bfca383326520b89bf99009bd6a89092d305147581e60a87770681b7c4
-
Filesize
6KB
MD5844ac7434699c5312e04e4608bad761c
SHA189be217c13fc6ec2bfe0e02ba1ad371faf857abd
SHA256e020bf35457cc968d6ab79d8f90271d5d2bb75110940d3a025b2d2f37cb12c70
SHA512d89303fa6cd14328a4045856a05ab3d15398eacf57c8feba230fa93aebcb87a058b4c88d27e2013b56c092b15238e4494c38dad737c245f19d3f3576ba81443b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5a9f78edda3aa4347f8decd274db43648
SHA17d2e350039f6ac21e0dba36e021608591194c85d
SHA256935ac58ed3299a1ebb794dd394b1478331590e6fb025a3cc1f3164f8c5132aa3
SHA512effbf91b4b7aada7cadbd34b00a56df209f12db65db1bacb53f387918270a541058cde883c5defa725f3eb84271c6f5d179bb87f27dbcb604a641d59f3c0a6c1
-
Filesize
11KB
MD545cf8b029b358624e980c648cf5a9c3f
SHA1bb6da11c5ee6c9e4d718728095bfd5eca0fbc2ef
SHA25645215c35160bcf8d0f53a3802943b985b3a8f37db54c2b274b0781803d3144fd
SHA5122179b0032fb1b5258d319fd47ea478303925fa7d3d9d353344e1891653132a1aa84246d7f59783aefd6a5468ca0f1f3d4b694fb131e89d22b0bef828a7f6b9aa