Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
cfc530360e5f73b6cab4556f6fcd565e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfc530360e5f73b6cab4556f6fcd565e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfc530360e5f73b6cab4556f6fcd565e_JaffaCakes118.html
-
Size
311KB
-
MD5
cfc530360e5f73b6cab4556f6fcd565e
-
SHA1
eadc5168384c4356314ef43909e71924ceb4cad6
-
SHA256
b11b336cb46046af434663eedce87de2f45da6ef662677c59d927a3b9ab892ad
-
SHA512
adad4133c58c690deccef544db42fc7141ac95e1cf8764ea005957d01870f1c782f119c104ebc7912b6bea3eb9704f60cda361aadf1f742890c16aa53b83ab70
-
SSDEEP
6144:xXXy6StIV8v9clNHUzMx2v7cKLp+T2pZldftumbK3DkPyCI7pFUDiZh6Rku/aIE:OlE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe 2308 msedge.exe 2308 msedge.exe 4464 identity_helper.exe 4464 identity_helper.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 852 2308 msedge.exe 83 PID 2308 wrote to memory of 852 2308 msedge.exe 83 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 1128 2308 msedge.exe 84 PID 2308 wrote to memory of 4664 2308 msedge.exe 85 PID 2308 wrote to memory of 4664 2308 msedge.exe 85 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86 PID 2308 wrote to memory of 4332 2308 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cfc530360e5f73b6cab4556f6fcd565e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8fa446f8,0x7ffa8fa44708,0x7ffa8fa447182⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7783845627275935190,2072772137263359121,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,7783845627275935190,2072772137263359121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,7783845627275935190,2072772137263359121,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7783845627275935190,2072772137263359121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7783845627275935190,2072772137263359121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7783845627275935190,2072772137263359121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7783845627275935190,2072772137263359121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,7783845627275935190,2072772137263359121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,7783845627275935190,2072772137263359121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7783845627275935190,2072772137263359121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7783845627275935190,2072772137263359121,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7783845627275935190,2072772137263359121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7783845627275935190,2072772137263359121,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7783845627275935190,2072772137263359121,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
23KB
MD5a0423f1305547bb6b8f5a4fb1a9fc2d8
SHA1092dcf1fe57e6bb53821eb754e04188ee70602d5
SHA2566add651cb411ed9ce9a17883c1522920a6ee3b4eb676f5b411e72d1a5e7de6e8
SHA512b8487c60b40d332e562cc5d4fc7c515e3b3c2c82311700b788905754c1376ce6f0da650583545a4691d51f04ec5da0c0204997214d167c85b788d4c85236c4c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD55c687951baf3e69874b6536821045b03
SHA13170ec9a158df62e6078afb08091e1b62e930e36
SHA256c0558c739fa28ac302727cb1ad9d192937189443798fedbe005d14df415ec0a1
SHA512709f521ea6cf765ddc039f74f948d4466692eed5fcd05d046c7cdfe67b0bfa926ae90c51e578a2680985d73d3031fa4b7f273d3d4c917ee692496882160b6b95
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5087425c894ae745242310ece6e124a70
SHA1a3bc33252fd5045c404a5d16fa85c38ee1769424
SHA256f0530f73074fc958f5de461a4edd40f1959694785f49ec6a80d6a791ce941752
SHA512da3ab115e58459c5dd260e176572aa9dd190b529e5fe355c75ac5045c402bc7e696ca8db71ea2ad2a7cf0464f4fd41fab4e56cff9a08a2d73236dc01807ff080
-
Filesize
1KB
MD54384bf86af5e02751b1a59908314d851
SHA1bc97a0df6701946c570ec62f8a1bea677add8231
SHA25628454af19ffa59332a8839f358a01331247e767f3da4aeb869452dc299e2af2e
SHA5127f9493953b2bdb2bed17fcf0ca31cb9ed8d5cee53a8c82c6035b801786c6b912789a2ff25e89d55190233a17458585ac3da9d1bf6596b234198b2b56cf07ace9
-
Filesize
6KB
MD54e8f062b618b3d10fb2ffb83486392b3
SHA19a6ba38fd2e1c63224f65dacaca02b5cb68d2408
SHA256a30b348dccd219e9518ac91ec1855a76418ffd0bf4649e1213b6d20a0d54e587
SHA512131b5a57674ce7c7d29c53ae684291111eebf0a707e68422a1be132695f3664bd09281addfe000b675429f6b5e0628c4e3c7b0aa71849961beb9c7d874ae3c67
-
Filesize
5KB
MD5c340f2baa524af59428313e4f96aa4fe
SHA18a57a50df9115db93578270876e4b25867401e4a
SHA256c7c4e723947c72aae9e10c1c6fc26af90e3719b542576e9550f39f6d8bd08c1c
SHA512f26fd51d0c08c03d95d1eba834a79fc32cf144f102bd55c5d4c100649fc03646b1eb67d70a26263c09ded07644c5754cc1086f515785d966976ec3ad4734dd2f
-
Filesize
6KB
MD549d4d22795669fcfd7ecfaa5df69e6ba
SHA18d167f15568249d8ccc3fa18c2f94cd8b99bda46
SHA2563043459c1eaafe74e514cf081368ea1254c6a1cca8b6252b816e8b01093e3260
SHA51280c5b6fdc27aaa0950bdc094cad20bae94f0f7f6d101f2337caafc6993de19eca519732b738f85f071ff724e76cecfa731264abb630d2c1126bdc89bbeed861e
-
Filesize
6KB
MD5172e3fd662714558abdf5867d13782a5
SHA19a6546d6144c300a072fa7e90dd2baf45f98a07d
SHA25644c57735103d47d09ad890ebec60441ba9f7ac8968b61794f195f2b08198e308
SHA512f19f2461c021a09ab53cc1f5a3a18f18420e52d1732f8a94b103b71e79f47180332b0c4bb2f2ce777d7cb216ff86c524daeb6bf92c1f6931776a8043d6da3256
-
Filesize
704B
MD51d07e657e2e5878853eaaf1b8e94c3d3
SHA168a322b09d31100f9a18d25bc5cb8449702e4a4d
SHA256b86fa29d952f1a1c283dc89807013aa9a03a971068d485be2b567510a63b4b48
SHA51201bf316ab38ddec555912dc0d4732e7a2e3bfeac600933c0468d13c3f7b1a807dca277839b19f4bb490c26c9876d51ccfd98eb2b8538a032c889e1cbee4ef936
-
Filesize
203B
MD534a905e1874419a7dfb3c3049c5ad6b9
SHA17593c93ab349fa3dab48fd34cc8cb71ccda43efe
SHA256eb132f69aceeb22c2c932cf14b07cd68874a0850a69b1ab93e68b1c8cd8e3d80
SHA512806b20cf1493e59f2aea6d9567186d5e9be0d585baef22fba4774e734184c6aac950b362967897b15320f49123aad729cf125670f8341975d4e1b946e7f60586
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5985041c3c8774f41b12c3310250ffd0e
SHA1d356b5ade389df1b68d3f504b9e0f7e442f791bf
SHA25658ce1ecce978cd6a1e2f49135a2ea9e3b4685dc4f7b3f21ebf37e70ce1fa79f3
SHA5126bba604bb10b45a146565e32ce7b6e96ba87720f53e6ca3ff4dddee51cd93dc2007380d5d84457d96b436e7f9fc95fde21ae0badbc7078c8291e6b716115f570