Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
6debabe7f1e858940daf04883a56a150_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6debabe7f1e858940daf04883a56a150_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
6debabe7f1e858940daf04883a56a150_JaffaCakes118.html
-
Size
100KB
-
MD5
6debabe7f1e858940daf04883a56a150
-
SHA1
e230f080c119428b043c9ef6fc7e8f7d95595b48
-
SHA256
d24c1e550291dcb5f6b510d161eb7bfabfbf1bfbc12fb6a736ee8ef69cd1758c
-
SHA512
be577031c9cf38d6b2bd676b1decf3b75a18fc1bd0f9e101571652618135a2a8d458aaf486679cdc67c9a294fc548c885b66b5fd77666804537ea1dc12df0854
-
SSDEEP
3072:GLDnfSnIoEVysyJlPI8+zmwgR/uIbp5Ztu2I2:GLDnfSQ1AXxI2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2264 msedge.exe 2264 msedge.exe 1048 msedge.exe 1048 msedge.exe 4532 identity_helper.exe 4532 identity_helper.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 4640 1048 msedge.exe 84 PID 1048 wrote to memory of 4640 1048 msedge.exe 84 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 5032 1048 msedge.exe 87 PID 1048 wrote to memory of 2264 1048 msedge.exe 88 PID 1048 wrote to memory of 2264 1048 msedge.exe 88 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89 PID 1048 wrote to memory of 4048 1048 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6debabe7f1e858940daf04883a56a150_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc02b446f8,0x7ffc02b44708,0x7ffc02b447182⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6996 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6996 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,12483938193802401493,17102554687594327082,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4612 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5979f949e3d8d41d715552412df716627
SHA130562aacc0ef2f790b764e18dd7f47b16d24a3a7
SHA256246c9d1c896f1400581f6d5ed871e2b941fb0c07edb93342bf2347c6d63057a8
SHA512383a6d1a474a4ddaf7e959e75847a1e66fecf629653066fbde29dc31c28baf62e6543cac6074f81815652b349d16302fb11dc4432e5f0548c3435777d5547a0e
-
Filesize
1KB
MD5dcd424cf8be5c48c35d2a7ab9c99853f
SHA188181fdb592830e23f5f83e4dbaefdff1aeafb5c
SHA256ac328c657c02f1b97a8775269dd2dc25a70c1ff0eee422dae61f0588e62cceb5
SHA512c3eae9f5051ed497745823c10054dcdac67b5d6d2a1e7aa615ed68b88569f2574b883c04655a8e0cf9a9a513494644cdbe28b606b40767b1ac40cba8b3d87270
-
Filesize
7KB
MD5e3c976a1f1054b07c0cff4db978c6e2e
SHA17f214100095e04f4a5009b650ea6073c1545ac65
SHA256c153694b905f2b75305eec60928ed58c8d2f62b6e6f4267d95fdc3e574815b97
SHA51296483d1e964470022ae22984391e7e4bc352b0a89ab35f14ad33d323aacf6f150a0d39394c2a60dd5eb51faff0d5d97338b6d1bc000bca42db2e5b26bbda33f5
-
Filesize
5KB
MD5ca3cc24cb28cd295f0da0e2534a1d355
SHA19716be7251c5b4aed4cc010a55964bfd4451bc9a
SHA256113d47e66c32a4ab039b1db197e447a67bd58a26cb523f9566fefc5861b253a7
SHA5122da5d09b8e7a2fd5f357362b3ff0ae8ed842acd7ea2cd51b439a2c920138530083d03d7b05cfd8fb73dd52395bfd165356c8fb9004ecc316185184904f74bf71
-
Filesize
8KB
MD5744a9652925071ebe2d007ac18ad1dbd
SHA1ec2688164a1d9af0685be1309583b1ce30c1bca3
SHA256b501b2e1ee45b66b3c0af42faa7d63477f3253aed2fd505321031dfce073971f
SHA512d187da4401b759245ff0ff3aa78ca8c39d474d5e987a32fd05b17b3c7b6a03df45a123bc12d09ef62cdb7240d42e8236ac877385c09a03e881a100d715b887eb
-
Filesize
7KB
MD56e395a4ab0a067d116c36df67353e823
SHA146f8c16c5a1e9844a72d7339d6b8fe8ce466112a
SHA25693ff13b86d31503d9c2f3950a32a7b8cc512c86e5af678e7bd9b9eb1bc677d3f
SHA5121ffc04876cd07342605b24ed53b7c8baf26e84d67645864ac431a73b03e4d6279d4fa1672612f145ed7e54ebbda3f0a339f84f5421d9c047439d4c89cc5f6a5c
-
Filesize
538B
MD5952ab252e839cc22a79e79987e510e4a
SHA1719ce44f47c42bc78ed96ab6be99f4e0cb03853a
SHA256fe540bc6df44dfd07ebb2107d1bccc2f4ae6651a1ef5ac23262a272333c891ce
SHA512617a931e0612243533e8753ad042a3d49667b6c00da50683f2aab31c6850795d136ceed94840078d38103c043e70111fd72b41957e19e136650c90929d1318ff
-
Filesize
203B
MD5f71e399985151ddd2af9ddea85cd9102
SHA197270cb6e257409e1de56d015b64b085613774c9
SHA2564db3280ba88f2b7bda1d8bb901fbfca3e94395d8fe925920876a6ea3478281b2
SHA512c406ce1af00d1654f21338b3bea127f413771ef5a6a6071923e50a50316794058224a4cdfff8e88ff13e68f2b074e4a9228cd405cd9aceaabefb6aee66f2093a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dd47515dd0916f76c46e1b5dc4201579
SHA11e7f30a28a98fdca6243a9d0c281fe1d9c44b930
SHA25699a7009dd29c2845929ea6e1cdc8230d5c9437cda140d9361af5c9e5fcf9c549
SHA5124653334e81dae5505d7965ca8bd040bbcbb36a7a0696d867a301ef9ac2b683ed5c8d229c3fd53969c9c180f7952ada04f62bded887f02be032b8e2615b8ac650