Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
db318c363136a191596ca92a174d1efc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
db318c363136a191596ca92a174d1efc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db318c363136a191596ca92a174d1efc_JaffaCakes118.html
-
Size
295KB
-
MD5
db318c363136a191596ca92a174d1efc
-
SHA1
30ddfa80a48716837aa629b9ac3c27c9853e1ddf
-
SHA256
9f01b5ce5068a29043f4dc1f7073bd9010d3790c4b4983d6ad49bf22ef18ea80
-
SHA512
da704be5598206567e07423d778d1d9d3d27bce90a9159bb4abfef856176dff8c3cbf85eeeed3a880d2e699d6401ff1df1893bd31246edd5dca6a0fdaa072ca8
-
SSDEEP
1536:4D+SbTTF1SjTl3NkltM/jVII3IbIre0ZGgBmp6ov4MJLnvMuOUPkI3Q9dE6el64P:O+SbTTFM3ItCVI2ihN4ucqiTCH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe 2248 msedge.exe 2248 msedge.exe 4356 identity_helper.exe 4356 identity_helper.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 3528 2248 msedge.exe 84 PID 2248 wrote to memory of 3528 2248 msedge.exe 84 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 5052 2248 msedge.exe 85 PID 2248 wrote to memory of 2804 2248 msedge.exe 86 PID 2248 wrote to memory of 2804 2248 msedge.exe 86 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87 PID 2248 wrote to memory of 864 2248 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\db318c363136a191596ca92a174d1efc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9657b46f8,0x7ff9657b4708,0x7ff9657b47182⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15849455599204469553,3950314705442279464,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,15849455599204469553,3950314705442279464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,15849455599204469553,3950314705442279464,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15849455599204469553,3950314705442279464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2788 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15849455599204469553,3950314705442279464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15849455599204469553,3950314705442279464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15849455599204469553,3950314705442279464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15849455599204469553,3950314705442279464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15849455599204469553,3950314705442279464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15849455599204469553,3950314705442279464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15849455599204469553,3950314705442279464,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15849455599204469553,3950314705442279464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15849455599204469553,3950314705442279464,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15849455599204469553,3950314705442279464,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
23KB
MD5a0423f1305547bb6b8f5a4fb1a9fc2d8
SHA1092dcf1fe57e6bb53821eb754e04188ee70602d5
SHA2566add651cb411ed9ce9a17883c1522920a6ee3b4eb676f5b411e72d1a5e7de6e8
SHA512b8487c60b40d332e562cc5d4fc7c515e3b3c2c82311700b788905754c1376ce6f0da650583545a4691d51f04ec5da0c0204997214d167c85b788d4c85236c4c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD52abc2e23ab480719af8fb96dfdd0a02e
SHA1116834d02dd6e8603d95eafc01190eadbbb0bf35
SHA256fed9e05b6076f9c5992a593028515db9295bdf306d677b9b376b86e54fd20dc2
SHA5120c85cee3703a19c0e99f2a141e94c99fd44837b7936019bf152a396721ef5b29387f4a98152cb1984748096ec7065cecaaacd3894f79dd4210117e17a05b4bd7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD57c4c2980d075c8272b81da364e2d6818
SHA1d222bfdf8c0a8fb448e892afeb16b4793beb4255
SHA256420b02924086509afaab9aa2e67c2deafa36fc36225a24871233e62b335d0c6d
SHA512baf9d80da5a8781fff422d5667fc1357bcf4b769c72f477b9019b397c1aa4a5eb2c413d53038ad44f3302811b876bd99dae31ccd9c8be92820e20b28e0d98f59
-
Filesize
1KB
MD54fe6386cfb489b225f1d5873ccac561c
SHA11e774b47ee1c963473cd61c6712cbb2207609237
SHA256137cf4401dbde5fc3788121b28b0c982c143f0c27428d401ca23ffff226a584e
SHA51230feb182a5c44356c8973d39306d08b067200702b375d1b699affaff84cc0cb37c734aaacdebb9c6f952fb5d34728247631b5deb60819e1f0ef893460382a10f
-
Filesize
6KB
MD5ce50f6c9b878476eee81198a2f9ef319
SHA11e63cfed29bfab1af9f70300e99353e3b02aa9e1
SHA256a27543c53a06d5252cfa9e6633a8ad0b231a6f8bc264f9ae5686ca193fd0dbef
SHA512ef6a3f0364fa7134e2cba79474b16823923e34bd17a8c9ade59c4af3679aa5da843a662344516987425330a044bb7fee8a10243ebb3ae22ae8ea4537ea028ceb
-
Filesize
5KB
MD5206640bb12e941cb571631deb69ce968
SHA112d0d31f0a4980a16c6ff701f8dcebe82d0c8746
SHA256e54ab3d60d42b62dce120ae73688ad330894df70ce84aa45685313a01dec1cbe
SHA51280bf968cc318c580bde30a14a8017c6fc98d90a4cf5c3bc99661702f06b62a8d0fc083309815ba91f33cfaaa00c61dfe80f82586d486df90ad956415193cef65
-
Filesize
6KB
MD5ab9d2facf8bd410c509c4912a49fb734
SHA102b1f69958b5aa532edcb3408e4d0586e52f6c9b
SHA25613cf7af9beab98a491621a1358e8cfb6dfa42dc7511c4c37a4a8d13775c9910d
SHA5128be419742bb1df7949e3faa96c90e3271de32c85dcaf301282d59f9f56e0ba3d6c195bf1dce3253d5198afeca2a763be146b18af8407b2dc9f5af11617bbf805
-
Filesize
6KB
MD55b21998ffcaaf3aae192abe700a7fbbd
SHA1811bbd6847c6720dee5ebfd7f8e2ced6d786021f
SHA256a3a3dcfa961664572a002bbb6cb4b606e0a7dd654cf5ba6103d62fca749c6f06
SHA5123e7b82401d4690f34cc316eedbf159350ebdcbe80897abc9ed739be782771f0e647f582255b82246396111c8c72268180fdf812e12d5c8f4c867404bfd7d4ca3
-
Filesize
704B
MD5c58c987bd4f19478c545c571640612a8
SHA1e2b4bade0530ff513ac68702d3817c2e23980038
SHA25611f783ab25c197f3773c8fe9963326b59eba5cc47c38cb35dcb502f26483e3fb
SHA5129dbe782a013085a5d17517760dd4e705285fc95da111fd52cefef0602d0d01dfa578aaca2f8f328bcf48c02e6d708e0231f2f9cce840ffc904fff6b81896db90
-
Filesize
203B
MD5219be661d94c15c102cdc82111269d06
SHA185672f85cd8c24882d0c5597904a8d4e3a8a7fce
SHA256427d27ee0a1b5660a656d31de64855bbf3165e983e063e3f6b0abddc7a34b180
SHA512291fb7ba7f2bbb40d71070e3a06bf95ffafc4b36bc768715ebee83b448cde4a6cf704d4589a117394565ccdd442efde59ced268e808dd410be6b446370ea30ca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b413f9fca1326b25ee6e6e64632c4fa9
SHA12d75c204707290994d51d701376f063286791753
SHA256ca5d58802bd1f07176dfd52f1192c5bfe702999c128b75723d9937f90ea14b94
SHA512f6d88c825d8d319e45e72d4e28bfd65365f14a0c9519da9c823462c780a9f173bcf89aef722263c19429334df44d6bc94cf64c0cca7915450fcf605cf0591acf