Overview
overview
7Static
static
7171f66ba3c...18.exe
windows7-x64
7171f66ba3c...18.exe
windows10-2004-x64
7$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
5$PLUGINSDI...om.dll
windows10-2004-x64
5$PLUGINSDIR/xml.dll
windows7-x64
3$PLUGINSDIR/xml.dll
windows10-2004-x64
3EDSDK.dll
windows7-x64
3EDSDK.dll
windows10-2004-x64
3EdsImage.dll
windows7-x64
3EdsImage.dll
windows10-2004-x64
3Help/en/ca...l.html
windows7-x64
3Help/en/ca...l.html
windows10-2004-x64
3Help/en/devices.html
windows7-x64
3Help/en/devices.html
windows10-2004-x64
1Help/en/fi...s.html
windows7-x64
3Help/en/fi...s.html
windows10-2004-x64
3Help/en/ge...g.html
windows7-x64
3Help/en/ge...g.html
windows10-2004-x64
3Help/en/import.html
windows7-x64
3Help/en/import.html
windows10-2004-x64
3Help/en/im...s.html
windows7-x64
3Help/en/im...s.html
windows10-2004-x64
3Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 09:28
Behavioral task
behavioral1
Sample
171f66ba3c071dbe1126d5f5fc3b6013_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
171f66ba3c071dbe1126d5f5fc3b6013_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/locate.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/locate.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
EDSDK.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
EDSDK.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
EdsImage.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
EdsImage.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Help/en/camcontrol.html
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Help/en/camcontrol.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Help/en/devices.html
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Help/en/devices.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Help/en/firststeps.html
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Help/en/firststeps.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Help/en/geocoding.html
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
Help/en/geocoding.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Help/en/import.html
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Help/en/import.html
Resource
win10v2004-20240910-en
Behavioral task
behavioral31
Sample
Help/en/importsettings.html
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Help/en/importsettings.html
Resource
win10v2004-20240802-en
General
-
Target
Help/en/import.html
-
Size
1KB
-
MD5
e5d2fff5bf2fcdfe92cf9f9431b2d488
-
SHA1
bc665e10b419c5e54cc4216c883ea78fe986b35f
-
SHA256
eaeed7b4978cf3cb564ba6bac39242dad81dadfff86af144bacf7e7efbc36fd3
-
SHA512
5c54a5090d8d58bf2f160e15b10eb03e06ea4df482d11bea13a0a54790912c0ba13938b522d1c2e7372678d80f86ea51bffc9c2df94960f16c40774a17c07e25
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4188 msedge.exe 4188 msedge.exe 1220 msedge.exe 1220 msedge.exe 1848 identity_helper.exe 1848 identity_helper.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1220 wrote to memory of 5108 1220 msedge.exe 84 PID 1220 wrote to memory of 5108 1220 msedge.exe 84 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 5036 1220 msedge.exe 86 PID 1220 wrote to memory of 4188 1220 msedge.exe 87 PID 1220 wrote to memory of 4188 1220 msedge.exe 87 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88 PID 1220 wrote to memory of 1892 1220 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Help\en\import.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe0d9746f8,0x7ffe0d974708,0x7ffe0d9747182⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11238809160292582402,5471673939172704661,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,11238809160292582402,5471673939172704661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,11238809160292582402,5471673939172704661,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11238809160292582402,5471673939172704661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11238809160292582402,5471673939172704661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11238809160292582402,5471673939172704661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11238809160292582402,5471673939172704661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11238809160292582402,5471673939172704661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11238809160292582402,5471673939172704661,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11238809160292582402,5471673939172704661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11238809160292582402,5471673939172704661,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11238809160292582402,5471673939172704661,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
5KB
MD5710c7e0c760ca16ee37936fde09ff3e9
SHA101c8ae575dd6b7176acf98ae64e4aaff14917b6e
SHA256484e3095e54132dfa06a808c6944e04be76f8750635d8b0554e3207e32c5de80
SHA5126176ac3fe61eb842bdde08a0245798d99efb9f37b59db64d0432b6752dcc25858fde0f5b878ba28d77da2adba21b05d96f4b8510aad4e164f62a44e723c26225
-
Filesize
6KB
MD523aa29f6199c926126c89e8f751231b5
SHA1761a688d9aee368decd986970f123a3195a4672f
SHA2568c0b22b315814a6a229c50333a971762488fcf549a2948de568d90d5cc5ee00f
SHA512a2135d7a2caa74013d1d7eb32d51752c720f7db1fc88a571a122f12d1cfab7e31882ae89629ab7eed2c405b033c12002eff4c74e0f9c78fadfd40404df8f0b32
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD58f0e4dbad69c9c005e15c70b5a4733e6
SHA1568787e6413417d718f267c13cb071cbe2a0f190
SHA25615aacda833328c1839a6f21684d4e8b94a21d3b9be32c0b9671113f6e2dea3b8
SHA51209885ee8e91cf00819a5bb6e1c61410bd9e617cb5e3e1235ee265e70c2e57064aae3975c4693ebba508b4a5a69d9469b1ffea83ddea0a3a844e71a191ff338f3