Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240729-en -
resource tags
arch:x64arch:x86image:win10v2004-20240729-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
7848bd9e41cb6deaca933e44085b2fd5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7848bd9e41cb6deaca933e44085b2fd5_JaffaCakes118.html
Resource
win10v2004-20240729-en
General
-
Target
7848bd9e41cb6deaca933e44085b2fd5_JaffaCakes118.html
-
Size
17KB
-
MD5
7848bd9e41cb6deaca933e44085b2fd5
-
SHA1
fe7254133441de52d9b2af42f47a57310221f4ce
-
SHA256
a0d167153519ccd0329fb9e98de3e5b85d2b6926474a2379f0655928ea8277e8
-
SHA512
3b4de24bb83aca2df9d59cc282f192b679e73886580d175c4dcfef3c1dd92371f05f2a7c160e87008ed4f2ccc42bc291cd549ec078fc2c962f49787b65cd3b71
-
SSDEEP
384:7v+YdOYhx0hZ0CxhnlOCKs014/12Joq73lyls6rDlwtsllkrlolel47plEK5555H:sXhZ0CxhnlOCKs014/12JR7urgg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1200 msedge.exe 1200 msedge.exe 1000 msedge.exe 1000 msedge.exe 2744 identity_helper.exe 2744 identity_helper.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1000 wrote to memory of 3200 1000 msedge.exe 83 PID 1000 wrote to memory of 3200 1000 msedge.exe 83 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 4780 1000 msedge.exe 85 PID 1000 wrote to memory of 1200 1000 msedge.exe 86 PID 1000 wrote to memory of 1200 1000 msedge.exe 86 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87 PID 1000 wrote to memory of 4068 1000 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7848bd9e41cb6deaca933e44085b2fd5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc19c46f8,0x7ffbc19c4708,0x7ffbc19c47182⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:82⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7651886033232031258,6511850436990045806,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58004d5759305b326cebfa4d67dee5f25
SHA136b9a94959977f79dd0a14380ba0516d09f8fcaa
SHA25621f35e2ac53a817389d7027e99018450993fc66e37f916e454bff9eed95562d7
SHA5127afba827395c1a5438091bd2762a097f6ea098fcbf3db99f90f9bc442afee7a7841a6e0e83f9cbf017cda0e52d35da93f8efd60cec73638baea5eaf1c85b7089
-
Filesize
152B
MD5368c244e384ff4d49f8c2e7b8bea96d2
SHA169ce5a9daeaf1e26bba509f9569dc68b9a455c51
SHA2566f8cb8fe96a0e80be05e02f0f504e40d20e7f5db23fd0edee0e56bcffa1059a3
SHA512ac460f1b35bcdefa89104e26379fc5639499607be6559353665a73ee8dd41822699d767532d48cffc67c755b75042294c29e93062d4eab22ca6bcbe054108a5c
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5d76ff081dff1642880e1f5a5310fb478
SHA14f0342445b0d24334c01a618962af87704d365b0
SHA25655bcc174952896f35a4cee4b16fb3d4964aba61cf4b7483abe5acec5ad783426
SHA512174b2454a63a28749055e7053bf3680831473124e1149f8585a216f0a221c240a5c7e462741285644e2d2cf8b808c561c75a75e1258383b844f87849a32b64e7
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
819B
MD507d3a7c0a4cd898d20657b814e0ab84e
SHA1f5b4f7c90d3d1da80ad75900936f8e044fb11fbb
SHA25690b2d80f6424e2d364e74f2d25151076849aa3755302f951b827231d309a5bd5
SHA5122089decd56045523e38a2b9133d3d7bbc74da48448a7a5c301f18b6240ec750de8845526a7ee7934201fd3a00c561a051b1acb16ab606f3b2b658cfd965531c1
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5a65db2d9ba03c3ed436c4b771ad0b58d
SHA10a6fb74906d441bbaa904b9eafaa3e403280155d
SHA256e53a70c1c7b2f014b69c4b05bc6ff05d07dc21bdaa493c31ef23b19f8289afe5
SHA512ef921fb3426743b518b00b852372e0f99775a0ba616c4d00be994d4837fbdcfa74720423e60b625ff0e15c8c7e59cc43cbcc00ea5340fabf7726fb086aa06090
-
Filesize
6KB
MD5772f35bc1d92cbae7f11b30fc1fc1bbb
SHA1213a85aea168d8468ae2f9f5e48bd964d23ad0d1
SHA2566e6582c3c69b48f4b98af232be081f12bd36f284c3ea909e30ea206c652f4d22
SHA512be11831a6e605c13512c91dad676628b5afa6fca0ae846dab5f3e7d276fb99b102d48e42452a6158b2bd66f2622f54f4734b8e64ef8ce15955470dbfdf164ed5
-
Filesize
6KB
MD5c94dc60fbbc61f4369ef32aa0a368bd9
SHA1330909904ef7fec3b19392566ca534f9230bae44
SHA256c0c152c77dae31335ea8affb095dcd2c3fcbfbf8af5bc44ceb8603386779cc4e
SHA512a11cf540587fdd939eb16bc13844d9b103f74f79a76684f88a74774455e55a4f99a807c278247be1098b3a2a3f9619ecfeb493f994fc86bcb5aa5ed58ba526f9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5416ac4785a58fa05e926aadef4daf7c5
SHA146a6980550e2d3512e79466ff256e41abfcb6e3e
SHA2567e6adba07c8aa6f48638b1acd5988a14b21c0fcc30afc093dbd492fb2b576df4
SHA51212bd0733301341d41ce910972777e3a21106c04b3f1dfaa16fe2d70cb7d63d8c235377fe2b58b4708301ded5daa8f84375afbc0620009a10ea13e3ba4ce11a11