Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 16:53
Static task
static1
Behavioral task
behavioral1
Sample
d002128d2f722b08b1135b0c937a0acb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d002128d2f722b08b1135b0c937a0acb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d002128d2f722b08b1135b0c937a0acb_JaffaCakes118.html
-
Size
159KB
-
MD5
d002128d2f722b08b1135b0c937a0acb
-
SHA1
e58571c1c75021e8a5d9700875afc4e5f848a044
-
SHA256
4bcfc4ceba5880dc188c1403ca400c0c0bd0b3774d6da4b811cc37e91a067882
-
SHA512
d1682807b734ade01b4b790aff40e2e3fb3c232f9acbf811aaeea67ebdab0f49fa2b654b96e5da692cb7ae8e0ee3834fcd5a2a384559aa0b46e9d982cb904353
-
SSDEEP
3072:sU+Yur217jYbeC10Nbqotbuf4f1U6+P9nUAeWhYHTAMOHi:sU+Yur2o0xxhUI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 968 msedge.exe 968 msedge.exe 4592 msedge.exe 4592 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4592 wrote to memory of 3308 4592 msedge.exe 83 PID 4592 wrote to memory of 3308 4592 msedge.exe 83 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 4280 4592 msedge.exe 84 PID 4592 wrote to memory of 968 4592 msedge.exe 85 PID 4592 wrote to memory of 968 4592 msedge.exe 85 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86 PID 4592 wrote to memory of 4284 4592 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d002128d2f722b08b1135b0c937a0acb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe94a546f8,0x7ffe94a54708,0x7ffe94a547182⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12076435982271964742,9192602595998257508,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,12076435982271964742,9192602595998257508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,12076435982271964742,9192602595998257508,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12076435982271964742,9192602595998257508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12076435982271964742,9192602595998257508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12076435982271964742,9192602595998257508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12076435982271964742,9192602595998257508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12076435982271964742,9192602595998257508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12076435982271964742,9192602595998257508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12076435982271964742,9192602595998257508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12076435982271964742,9192602595998257508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12076435982271964742,9192602595998257508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12076435982271964742,9192602595998257508,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
20KB
MD5715c79e5f50f4530260c4456cd414d72
SHA1b8f156341cdef9b668d4a820b06fbb1e4eb48584
SHA256d1918937db9a519cacc80b9ee812eaeebffee72782dcf7a189022909046164f2
SHA5128fee1f9df28e7ec04a63bc85f5e7988fc1de0c94b905c58277ef00bfaf645e3f7359d9405bd726e420cebe898b687335e6d36e17a5c740aa774e9e3d249dfef6
-
Filesize
754KB
MD5a4c85b6bcc31263cd7dc7be3d6dbef22
SHA1a2e872c395eb0ce75fff8713176dfa28d89c5daa
SHA2560511565bfa67d617d8cc904135ac0ae7d108211b22538ec4fcffb1bd35ab968f
SHA512e7a507c4ad33bb00699d595e8aa03a6fb0010ff69e260536cfd615f296ea08f13fdd362106adef0204b8555d71afc8ffa347f1c72abb93442fd0cd432e7e4a1c
-
Filesize
41KB
MD5a8c2d72074b516f0f9527b492f6e7c4c
SHA1e9fbccb6f4dc886906aae43220812f8317c2fd6c
SHA256e61d49bb3bc6024a979c9b8f8941112d2e39e38852366dd5fd57e0613d753051
SHA51206d09eb5b1ec9e50ce1964169827432f47ea0785103b80e42f77f97dffc128929caf20575e7e076a56e713afe1d24b88e4e9da8222d9946f16a199de15f373b7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD548a72e1e8b6f534cdf3c89f33d82cb06
SHA1cd8cdf7ff5db277929703182a6313e8bf528b6a7
SHA2568294fe88cf76920ee8da4e3aabea1d7f6ab0452e9946eb4af4b2121e777f3ea5
SHA512e639d51de640d2e8fe85e32106ddc281214d9eb892674600f551c7274e9dcbad9bec79a3aa382c9cf9886443ee418a04c938bb6f72ea6cbb215f466938e04cba
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD54cf9a94d9ddc80eb7673182ce7ccd9b6
SHA171f6711619f68b4d9f469eb80b361ac242de6fd8
SHA25665c02d9ea4ff227a8003adf6ea61c9430835039966f9cb55a406a7b6a3f40c17
SHA5125a726e7798c0cb887f727fc968dc6be6615aaaa1d35cc7bc32ffa9cf37c7c0df1aad91dc244833d8c4a81f40219c9d4cb6c8e09fe5e0f0e37cee709b0f2d037a
-
Filesize
5KB
MD5945b102c6b90aad5299ee498121b5097
SHA1db9a5885e43a37be4db2f6bdcb329c6cd09b4ed6
SHA256294e515a908a6d5aa4d669aa9c3aecac3c86993019c056791976359ff240638a
SHA512427678b0aaade2277c273d438d247c5bb724f9b12e559bf024bd5217ffefc1fcdeca3e8f7545da0a7514a07751be552ba6148122c46f749c80810d65bca301ee
-
Filesize
5KB
MD5f9f56d55ad5798b07827f1863b838d2a
SHA16a7a53db00eb828e0a79ef0f3da99f93d4e89a85
SHA256740dd8751dd8a4118c6af7831cdaa5658fd6e3a6ac300135316847262cdd2eef
SHA5128e68fc36c68856f16a64a423632487953ecee0d0140afc4fde7b6c41e5ed9ead6e47400f96830f89d692cee27528af09a4cdc2b943fe26a3c23801c4c709f28f
-
Filesize
5KB
MD5b4579e3c2175b876cd56f3426dfb43d6
SHA1f615599134ab83bbcdddbea97af5b0218a4ed8be
SHA2560f51411c913a293c9e98ffde37bac342b2a8ce4bb1e4c5758d02871d970c997b
SHA5120634d4d667117bf60a591d59b445d158c4191923b54c7eb0ac464ebebee4a1868774e2b9d114cd97962bcc1606cd0b94bc86b3576e0290b3826b3de93fb8b62d
-
Filesize
9KB
MD56274bda3c4441975be22f84808516c6b
SHA1757a625199ec742bff077c2d01f0c3d006d929d7
SHA2562462443e26459d55040cfdb6a3f5d95dba98ca414475661b5d87e4da189fc80f
SHA512823d8440354f1319ce623a748b6d7eb3bb6bce5955075185a7510ed21511a71024004e4028118c00d11986165151fc651060143276b95ff238e1ff531e59c6c9
-
Filesize
9KB
MD544e8f10a133893b06027f5a3d10204b0
SHA1cba6f7dc7330b4885f3c3b15e543318eb222f277
SHA256280ef4e21da62c24d80d0eb3e7b0c3e95137fbe6f50c49d8d31a0f2c804dae2a
SHA5127812833f624fc85bec179f0ab40ad8500e389d0097cb782a8b1b12345095a65d662e12af5a5e161f30d175de57223edc4dcdad3c8c2540c9c773aafa1afcec07
-
Filesize
1KB
MD5b99ae1dccaa4051b94d9813658e9f8cb
SHA1d9abd4f7ca2a71ea43b4768735d9242808e8b97c
SHA2565f0d51d705c93776d61832e9c52ac4f1c32ac6aeb1631501dea45b63a5d33a16
SHA512a71c9d90d073e557e17915ab3785b3a15c6780b475c3d608bcceff79ea3998308baa4446a48e5f2c3f14923fb51323ae305ac6a5b0dfacfe24a537856a63edab
-
Filesize
1KB
MD5ba1036d1c4f6c4c778b05102d282fcce
SHA1d783b0912eab7ff95c596cc1f76d0097d5171020
SHA256a6dd5a36b9b92e6ea8ab195b1fda988f3de78eb1b12e7f6901d08ae4beb88684
SHA512757f93cb2c4482ac7b0e33a2c72bab001698dd8b54b554fa091d16d82f85edcafbfaf24f4fb685800b2e12015bba62aa082aee66821899d677c1d5571c8e907a
-
Filesize
10KB
MD5413a64a00c907f950139dfa1aba76b80
SHA17d9a5a9c6cbc61acdd3c3b13bde1a4c61c1afb21
SHA25644e2edde9b994982501cc28b9ab4ede68c2f1d12d24fd99fef5d3a2773f09519
SHA5122d2f228915f621f3b562aa1ccb1333f93def1a159acee0c1081875f7a047650f3b43745efb7d3d582eddc32a10747c6d1a48e9cfc29bb4a38f73d2a64470a0b7