Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 16:04
Static task
static1
Behavioral task
behavioral1
Sample
6b3262ceaf30d96338b0e5eb3c3ffb65_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6b3262ceaf30d96338b0e5eb3c3ffb65_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
6b3262ceaf30d96338b0e5eb3c3ffb65_JaffaCakes118.html
-
Size
216KB
-
MD5
6b3262ceaf30d96338b0e5eb3c3ffb65
-
SHA1
4f4b34b9bf68bd251292036f4b3c40ec0c43507b
-
SHA256
7ed4524d5eba906bf4365464963688761ec4f49c974ef2689765799bae9f5a14
-
SHA512
9182a2bbdf295d03bf3b3e7753322e5218db74ab2526ff9878fe92044dd3fe4d43e7910fdda77bfddc7d74c404e48c497c87289180a22ea86b4021ac59429cec
-
SSDEEP
3072:AUcjvG8rMdcXmNRS+ttUp0CFUDYNqBn/lCzBMdtV1/hHUNpNkZFl:YrXmNRkaDYNmzF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 3968 msedge.exe 3968 msedge.exe 3912 identity_helper.exe 3912 identity_helper.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3968 wrote to memory of 2560 3968 msedge.exe 84 PID 3968 wrote to memory of 2560 3968 msedge.exe 84 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 716 3968 msedge.exe 85 PID 3968 wrote to memory of 1892 3968 msedge.exe 86 PID 3968 wrote to memory of 1892 3968 msedge.exe 86 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87 PID 3968 wrote to memory of 2440 3968 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6b3262ceaf30d96338b0e5eb3c3ffb65_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb566e46f8,0x7ffb566e4708,0x7ffb566e47182⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,8968221342655406714,238527847657970916,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
23KB
MD5318ffbb8b70b421abc02996dcfe8afc3
SHA14240e64a8604fa36481bf24471545a2c7c10c89c
SHA256fba866aea3cb0fce98cf10cb57975933d6cfaaed27f9f25250008814c9bf8e95
SHA5121a0f6266836348c4ee0fbfdfdc9197b66add2a5b150ea8a1205b4e3876eb5c82d7404bd26791de29ff48004dfed187d9bab5a9678dfe1c71cf513dd49abacc56
-
Filesize
42KB
MD5101f2295c59a6c129b95bb68093aed06
SHA112f5843daaf99bdb874dfebaf10660c54ede2120
SHA2569b59525954d9da17ff56cac0c0cda55bb6c4df6b7550fe68565fe0d24a963ac7
SHA512f5e54b7609a1884253f1d05d9245def95b3721e1163ddabb6d32f5b31f824a218c60533eef25a6f91d8ae6fa314128ae258fdc341cf9a4f36bf378e874b5277f
-
Filesize
288B
MD5f131cd1c9f8f1aaad93e2c536b30dbd8
SHA182e0c3d3ce89049b3f74671deacdb66c34aee76a
SHA256d8caff64befbd57ce4c3f06c7bbb3926ca709c387bf413e5554e2f854a3151f0
SHA512be5d0bfcc878f4cd3a760821f58db4f84d62dc1b68f61c6e97d42b794d0be732cb19b932bdfbdddd94bd1d93b95acd6cd11bda80012240ebcc759d17a4ba955a
-
Filesize
1KB
MD589d40a3f3b6f0c7e67b2fa96defe3bed
SHA1a2dd2f924877579874ad9f314c5aad1ae443f50a
SHA25668f28eda2a6142e5452ede778b0d36fb4c13a518b0abc39a26108e5be6c54e00
SHA512740c06749e9d4cfcbf5aa370dbd123b25a1cb1700824b8a538ee938a4512efd77bd20e9f5206b624a9c6c9edfe0e37617de5b60ea0b4ef9d1d28d81590b733f2
-
Filesize
6KB
MD57782ba6ac2209ee976ca33073a4329cd
SHA15ad550aa32952adfe1d72b3e3f377a555a6840a8
SHA256f1b42c73f4317941887408b33912726c6f2b8ad54b8b4c41155be046fac27a44
SHA5121cb1394cc2f8703a5ad4e22e6c27080c192f2b18f1fa50f7b51d68b0ce931acb2beb209777a6f661c69bba400e15695005c0acc4bf42a3fe1baa088fbd6247df
-
Filesize
5KB
MD5c986406b8ae38452488fb63708ae8a93
SHA1931c4134e0a24f2239beb3617f5df6233047f165
SHA25691db73721188f5dec112ae0340a8bd3ac866fe0f78eecf52e91381ae3c27918c
SHA5121a6678e9ad23820abf64f5b72b4df54aebef8b672b95b3464815ae0761886a40cc60c8d1ede582e88de0e0b6aa49f85b88965d983435903a0b7545a364226314
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b7cc1319-6ba0-4cd4-bb33-c2925009b7d2.tmp
Filesize7KB
MD54d8335563c85aaf375b975f1e01f5218
SHA1d0cd662a90b0e225e99e67bbf93e322a1c0be32f
SHA256f1eb1e9f52db168e8aacccbf01c2065b287fde78a408e5236f18c3c70632098f
SHA512634dccaa6e866025bb91506432c3f71bb2a1894a9d351b084bd961018240e88e48f94ad6db365ede2e14dc4730ed5e778067a11fda2de68eb20face14ff1f942
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5944cdf4ea2c642b4635bd4a25c165da3
SHA1aa901243d2cf56eb9b97b1440365754e01c5c4c7
SHA256c75b763abbe0c0a724c8f42d58b66a0e8f3fd8da67233625837274b2cc49e8c6
SHA512f36b425e42cca31ba3865dbd7d6ba695452b6b7913014226e1cd6b90dd3c2356b44c7ea6979718fef9e363886bb5493d10fad28bea866e29a092f6e7608fb8a7