Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 00:13
Static task
static1
Behavioral task
behavioral1
Sample
68040c4c76fef0eea0a9950a2a69e48f_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
68040c4c76fef0eea0a9950a2a69e48f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
68040c4c76fef0eea0a9950a2a69e48f_JaffaCakes118.html
-
Size
131KB
-
MD5
68040c4c76fef0eea0a9950a2a69e48f
-
SHA1
e2e1d9af3a5b6481d896b2d65c53d2a48cf446b0
-
SHA256
a4f041b9b85356dd4b2535242cef09f90ed6bd268963963a86f6859e4b9d168f
-
SHA512
9604d1bc086c01502981fa70b67ab36da059aa0d7a53b7a1f5876028d485bb8621e6aca9d7d9246dcdc59ba3aaa87c1c318ab20d3c33623479487409ff99a9fc
-
SSDEEP
1536:5VWdJEEJXFE/ICDrnDD9BVZfkj/f5w4w+iJ:5wJXe/ICDrnfVZfJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe 1616 msedge.exe 1616 msedge.exe 3884 identity_helper.exe 3884 identity_helper.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2132 1616 msedge.exe 84 PID 1616 wrote to memory of 2132 1616 msedge.exe 84 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 2828 1616 msedge.exe 85 PID 1616 wrote to memory of 4132 1616 msedge.exe 86 PID 1616 wrote to memory of 4132 1616 msedge.exe 86 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87 PID 1616 wrote to memory of 1348 1616 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68040c4c76fef0eea0a9950a2a69e48f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff276546f8,0x7fff27654708,0x7fff276547182⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2568 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1964 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6444 /prefetch:82⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14167671342079988903,6363610205645669873,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5847f67d004602310d44a5338db470b16
SHA160ec392cbc2ef0b0c4467485ef5a36f083c956b0
SHA256cbae363d537acfd46dee9481b46748f87174ebc569afe4993d5fb97facf67ae7
SHA51207d5bc77b1540fa65bba1567996e228e2570451c5d5822cd0204bf8c18ef423aafae95f63bf7b92d649a9762a500b29f03ca2d56bb2244824867591a8047f310
-
Filesize
1KB
MD5a7f5b2355981be25871c6974b1eba37f
SHA1e9524e3e5828e100510137727b67e042c68ebb6a
SHA256b053a2c7f324574ef7f820e8e4569af24794f1c70fda3f2ae0fa335f1e401353
SHA512817e60d3bc68df712b870fae8b28b1e19407233867e5a1dd06c2eb66a0f4aac4df4415f954d9d0e296155341f6ddb4feff73b153a8e0a9273151cf81d6190714
-
Filesize
2KB
MD577c402bcd62f296e86f4a383edbe7438
SHA1426ffeb380c95833fdb9f88137d06b919cf2dffb
SHA256d2f9ee9b8ec5574a0777243aac13092ebeb6c028c0255f861f395ba734988fd9
SHA512dd3f16317cb29c8baf685ea2aaf6700c08342e0b84ae5bdafbd45ca89e11be128693f683cbf1253456a9eda69859d56bc6260b112e41373a6bb715bdcd4d7270
-
Filesize
5KB
MD578568806827c5443b7dc1eeb66720227
SHA1e98638f1901896fa41133a2cd7a180d239867d57
SHA256972404ac6f2a3ec26500a14a3983b358e8d3f867d35b10265ff2b75970b28b08
SHA5121cfe8900cfd048c703c680f1b5a40ada4459b2bf7a3a6f78cbbde7ce32bdcf0064aa1cd105fc061409e38abc1bba04a59a31096a7b39b07d1c3b75ea0c003c29
-
Filesize
7KB
MD58057ce376c4943205d5475622e1198db
SHA1a07f99be196b0207c81dfe9088bea2ea1dbb715e
SHA256612076dc2bd0ece9b7958edbcd31cdc42a9dd9afe6bcfa5a71b3ffe2ca01aa93
SHA512ec3cd73b4b642d08b5a197470d72deb3bd24e1f2dca3a6951a03851a52a98c79864f2c29ee545a8065b8fc476aef9eaa1be96191e43841f78d23247df58e2360
-
Filesize
6KB
MD5073639f2e81e29320db04cf025e1c31f
SHA19b226eeab873d7de3354ae52ae04e08f2ec16e85
SHA256b2077584ea30ad3bc4ff87488a8f55d9016a1da08d5d627beaf260e3fa149973
SHA51231c327838163f3cde8538aa6e379744903d1b9ed63bc4286c2b166fbb09deafb58126bcd533decc0519931138ddcb6c07469bde86235ff7c30d7e545a04d3f2e
-
Filesize
1KB
MD50fe8498dd0da171325c33512721fe399
SHA19c1a7d91b4534fcbda7bfcd3413463d4b328bc5c
SHA256cbedfe91e1e2559fc32a54a4bcf0aebc11863d17846e2c2488bd9be92064698f
SHA512be4925d503023ca5f4b82edd2f1302de897f0d8ecca14432af6da81f7f9bffd9637a2c1a449ac5a714f80a02a819347ac186ae0f8bc06382b6248cab9953be86
-
Filesize
874B
MD5b8defe9ec5cec01f7fe211298b5ceee8
SHA1bffc9b1dab60a3b4bd66ffb8030b44ac5aa001a5
SHA2566a494f3137e87ce4c23e346de77a36821bcb1fb9f5e75471925d8471ef6fdccf
SHA512485ceaecc3f0f3c508fa1800df468d91f4f3e8064711c1418511515e9ef8862ead86523a898326a1add922202b1fdb5a5c24f952a383d773a88f71f48b0bb718
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5878b11da9c2ef39a3e19cef79937af55
SHA1a39ae4c3e5318cce7a63759b7bc11af13c125e43
SHA256989030b3a5a980365ef25c2bd1f83619bdeac19241d477239ad45c6bf752ce75
SHA512d2cb88ef3c7db4c0156d028dda77e0822fc6ba9a6eb5f3a808e3e8b632f75a9e34fe6465e9135c09417ead7e8f8af848584def0d88337e162ffcf87ea6055546