Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
38501ae25d9685267e08e47e7512e393_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
38501ae25d9685267e08e47e7512e393_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
38501ae25d9685267e08e47e7512e393_JaffaCakes118.html
-
Size
30KB
-
MD5
38501ae25d9685267e08e47e7512e393
-
SHA1
780b88749993942e6e886dde554e8d224a6bdd6b
-
SHA256
39578b2f48128f983e0c98ce401c5c902d3a4dd62e65f4d7c3c95d947fb1835a
-
SHA512
f89de53324ec56cff539b6666ee761a7699d9fe36d70e0f4078d45ae71e3a9c70be7e432e3c0367fe10ca20872514faa94f55a2079fcb08a6087e67dcef17114
-
SSDEEP
384:vJPz3bxnT0EipB0oue4zQ5itR3jWVCGWH0JzemBS5okm2ALWAj7VD7F+dllA+lTg:vzT0EipBZflItj/9Hutmon1FD7F+6CSP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 5036 msedge.exe 5036 msedge.exe 2044 identity_helper.exe 2044 identity_helper.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 3848 5036 msedge.exe 83 PID 5036 wrote to memory of 3848 5036 msedge.exe 83 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 4020 5036 msedge.exe 85 PID 5036 wrote to memory of 3940 5036 msedge.exe 86 PID 5036 wrote to memory of 3940 5036 msedge.exe 86 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87 PID 5036 wrote to memory of 3160 5036 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\38501ae25d9685267e08e47e7512e393_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa34e846f8,0x7ffa34e84708,0x7ffa34e847182⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:82⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,18145680884572982704,12185473190038169653,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD504b60a51907d399f3685e03094b603cb
SHA1228d18888782f4e66ca207c1a073560e0a4cc6e7
SHA25687a9d9f1bd99313295b2ce703580b9d37c3a68b9b33026fdda4c2530f562e6a3
SHA5122a8e3da94eaf0a6c4a2f29da6fec2796ba6a13cad6425bb650349a60eb3204643fc2fd1ab425f0251610cb9cce65e7dba459388b4e00c12ba3434a1798855c91
-
Filesize
152B
MD59622e603d436ca747f3a4407a6ca952e
SHA1297d9aed5337a8a7290ea436b61458c372b1d497
SHA256ace0e47e358fba0831b508cd23949a503ae0e6a5c857859e720d1b6479ff2261
SHA512f774c5c44f0fcdfb45847626f6808076dccabfbcb8a37d00329ec792e2901dc59636ef15c95d84d0080272571542d43b473ce11c2209ac251bee13bd611b200a
-
Filesize
21KB
MD5549baced2c151db8a02c3419aa5c01be
SHA11f36a9716da201c5e45c1cc23c349bbaae44a3c9
SHA25611938f83bd463e29316808f3e118440f718f1c7a0761bc860171255a96cbefca
SHA51212c40a66af58d9436d7c3361de906077402cfeded97361c81d9900d69d405b5ab002ac36aad3f8152c6083e00755442bd1bcd1766af26c097638051dfe1aa9d0
-
Filesize
45KB
MD594019c00785285cd78d6da8a1bdeaf80
SHA133ba11bbe8c91eca17a84c3dcae4667638a61b57
SHA2562ea5a487d117c082ab04c8b2d979adc04c18f496af90ef2caf9910d9902ef8a9
SHA512b58d23d9333290e203ee3191cbcca4686ae1f9b4c135ee8a8e0f014e7db4efdcffe6aa82b502b2d8e63bde705895a04726d799a4c6b0e22783b6925b4d297d70
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5278a31195a2ae76ec7bf88bf9b4f1842
SHA18b6135555dfd0cf2dde74ec62c412e4adcf02fa9
SHA256c68d64bfc1e74427ec8cc6cb9a1325a27b361bdc4090f3ceece87e47eca9c26c
SHA5126b774a671ff572fabfeb80344997e4c6671567d0d457cc9854430a90a133fc15d6097b29cbee4f889037b2261b9ab1b1aa7c3901420243eb85d9802455ab3129
-
Filesize
1KB
MD5a2faa0219cd0c5d0ca6330d5fa88e648
SHA1b115b541552bb0212d05938cb0eb2dadc6691745
SHA25698fdf1df91518110027c16dd58672807079681ecf4fbf01d6e6ba096f728caa0
SHA51229e35fc694119001866fa84ef8baa1d2f129db06cbbf6f6ada0cb6469b030318bfd25bf2d7d75150b205358e3faca40dd33d627d806ee772f41c89a3ceec60b6
-
Filesize
6KB
MD50ce21e8bbeb5042768c06493335dc180
SHA127d950e9c0547aa89233e6ce212b1e821700b49c
SHA256f1b3ae233ebbfda0fa112c01f55802bb0f7446b150fc7de210aac418d1d34381
SHA5123952e8297fe032f947d92fea4c55779d787158f6b500c4e61e68180ace6eb116af0eb03d57642785ae881386c8ffd3542823e2acb3202b2af347497444a3583f
-
Filesize
6KB
MD52efe5b1c07f7333a65211da57655b124
SHA11fa8ff0a821a36862404f22966c17722cbb6597e
SHA256c8ae46669381f4927bbf2c324438786413f2ed909c734f287c01caa18bd5f3e7
SHA512ee882789058e7dd28b602956ac3b21833a68d88d7f72e2e3cb23b4dfa3659d6e4aee5b2f5126dd7ac023f70003729b3ddf67533a92603c27d5ec362c35215ca7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD51fc5178e01fcbe4d5ab7fba5f2b31cb5
SHA1769a317e891f8c08e7967834ec2ce4413ce3acd9
SHA256f26fe9c92ec8ba71c2d07a4df7e07ec090ee3d975746e47c3dec53f7a3618c3a
SHA512bae3178ad234f4ef569086dfd80f8591dfb4a441e77b8ebb403130a2b93d748745a04aa79307e4c7bd4f88ebd75254edaf1f2593b3646611eb8d880e5ffc3e28