Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
2bb2ad206d2358f1dc470db1bdbdde0c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2bb2ad206d2358f1dc470db1bdbdde0c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2bb2ad206d2358f1dc470db1bdbdde0c_JaffaCakes118.html
-
Size
60KB
-
MD5
2bb2ad206d2358f1dc470db1bdbdde0c
-
SHA1
6adcb5b5d998d58d9e9e379c430db2b39a017f30
-
SHA256
805c5bc3ad39a4bf766ec628185d773c354a637ad2887e5f72f1646b7f7afade
-
SHA512
3622b89c82465227f89f1eb919c31a686f13503f231b0dcc8c094aee1f1ffc660739a331f8946e933e64e4abf2cea335ccdd54c948b90ceda772419cc6181888
-
SSDEEP
768:SYmGoA3J+6fGRp+ZJyI2oxAcadb2tqEGrD3LamDNLEU:SY9MP+Zf2oxAxHEcD3LamDNLEU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3804 msedge.exe 3804 msedge.exe 1980 msedge.exe 1980 msedge.exe 4660 identity_helper.exe 4660 identity_helper.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1980 wrote to memory of 4400 1980 msedge.exe 83 PID 1980 wrote to memory of 4400 1980 msedge.exe 83 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3152 1980 msedge.exe 84 PID 1980 wrote to memory of 3804 1980 msedge.exe 85 PID 1980 wrote to memory of 3804 1980 msedge.exe 85 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86 PID 1980 wrote to memory of 3312 1980 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2bb2ad206d2358f1dc470db1bdbdde0c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1d5946f8,0x7ffc1d594708,0x7ffc1d5947182⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5909139563660740174,4834601814415168312,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,5909139563660740174,4834601814415168312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,5909139563660740174,4834601814415168312,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5909139563660740174,4834601814415168312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5909139563660740174,4834601814415168312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5909139563660740174,4834601814415168312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5909139563660740174,4834601814415168312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5909139563660740174,4834601814415168312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5909139563660740174,4834601814415168312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5909139563660740174,4834601814415168312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5909139563660740174,4834601814415168312,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5909139563660740174,4834601814415168312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5909139563660740174,4834601814415168312,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5909139563660740174,4834601814415168312,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
47KB
MD556a44607861eed852e6334bab70443c3
SHA11fae354a2e2bfb95bb5f8b71901ed3bd5ebc7339
SHA2564c28f57be6ecf8568c9d2c1509ecc2cc194a2961e2d2638a70842f0315e5a0fb
SHA512b190d47b8cfd9c482f445afaa9e9e2e112a3ba83110a897da024de476ebf41e14801d29daaceed26f1be12a398d50f7ee9ef558f0f2e706daf894cf93a9c0f83
-
Filesize
19KB
MD5a4ad7440aff0ddea176853cca1486e53
SHA13f5c884def7f423bed5ed2142d42c672e29af5c8
SHA2561f826b0323360b2e481c3a4273bc4fab05d58ed7ef26396f2f8fbc93125c8c19
SHA512a5840b967e526506f8b96e8507e0a2e0afe2cd3b8b1092393f05fec3a7446978a3d743f0a667113ae60fc9182f0e6a668b9334257d3a14e58f668e0976dc79a9
-
Filesize
98KB
MD582934e4d876b2b0d918437893542c869
SHA13499a9827c7a4922d801c64ee245fa30110e9a4a
SHA256a873c919e4a5725e9fae2f5c856258b53b8d9007799d63c90eb2e9b55167d386
SHA512d68030ceffe52527f8dbd092a81633c5184414cc52960870a0aa0ba817ce121b965edb666d3abfb5817e12bc6d9e4540b4580e71cf324e4e48b6a9c4bed7bf3c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD55dc29b90bd401b10023968a44bb90315
SHA19c8cc2ca03e63605cc7b6070678109971bdf363d
SHA256f639bf4d03aff30f00a5b10a043d521ff92f8444dd50f23d4b97ce100ab9c996
SHA512d1213da7a2776924b5974e8a89771d069fe10751f3ab8b5ed90d0b3f31ed690e00f809b7256efc044356bcbafcaefaaa1c0db727358740ff3bfe609c9d86b27b
-
Filesize
2KB
MD539411ada63bc1562e403446a71b1b3aa
SHA18b634ab8e11940dbe4b67eb9dbc3b719aeb9026c
SHA256656aadf94ca75801a42944f161842f1e78e61fdb80dfeb2be18b8f02a6724900
SHA512d06d3372172054abf8df7cd1d880ad7e78498b206b446e61f48ea871198f5fb6fea0d89a907496913d7a3bf88d9d4dfcb2d80b09ae10596dbf302f746b329efc
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD582ada634a0f8c594022d736d2f4be93b
SHA16394b4a2c93096ec584548190317e5e46baad004
SHA256ffe9c0e242e815f1d26281ac345738f2c1f4b3262289662e4e08637afe072272
SHA512c6a6037557d6a3185b57643e1ecf8378bc6a7dfaa9a9ff12bdbe4b72d3662cbead9eca4723d6bd0e6338247821a27156d1d6c0b4d1cd49255d2c68a3ffa7aa88
-
Filesize
6KB
MD50615b94f37776379c0cbf21a228f8e57
SHA1e63566a02d97b02fcb91865dcaea024dd269c91e
SHA256d42f7c83e9a934b516b53d41229e0775340f89685a8964f474650fc0ace49fbb
SHA512747b46e659070df2a320e6ec01f0962ca283a686deada03f15a2ff402eb7cec12e35e0886431228e6bb7e2bb057567ea576b7dba12655ffea235ebb8076aae53
-
Filesize
6KB
MD509c6e1367f8de947528008aae5b583e7
SHA13ba9483a78f4e011f186d8dcd12374fe3bb9c969
SHA2568a9f5b6cce870d5e50b4851c7e2db5514aba6ebd001dadc26569a3bf19b9f57c
SHA512924f094d16a05d1e9a489c21a872267cf17a7b9e118642f5b94ab39f0f0ea14d98c1a0cf777a5dd201fdee8744062dbfe4fe446c531476c63cde762a1a5c6ed4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD587846d3e774a0ebc4d79a2d786f7180d
SHA116ab749f9e7ebdcb3ae33744b00e4ceac839a029
SHA2562f858afdf7b8618c84f7b6cbd599838c1df96fefae5d135b68933cf67f7430e7
SHA512f8ce5f8760caa011102be70e1789a353b6eccb81899f432a124a208e75c58141f7990bdef800fc372cf445fbcfb0d568c511de5a0404da36f2bb535984b8efba