Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2024 18:55
Static task
static1
Behavioral task
behavioral1
Sample
7c71f2faae442fdbb48a5c2913139c89_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7c71f2faae442fdbb48a5c2913139c89_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
7c71f2faae442fdbb48a5c2913139c89_JaffaCakes118.html
-
Size
179KB
-
MD5
7c71f2faae442fdbb48a5c2913139c89
-
SHA1
da0137cb94278d680c1fbe3e204a6486373571f9
-
SHA256
c21d70c265a9a6602c25f38bc3532a316a36fedd15c2635aa4335bf94010ed7f
-
SHA512
7d0a2d36495907e8510f55a533ff86f2fdb9bce2eeda5ea714d353370faded897ce4c02eaa0ec50fd61449f1e07acd86373fc95138a60af6b891be4384579923
-
SSDEEP
3072:pqRcVhIVs2LQegU0Dzvj40MZEPjLpUxAfYxslxNcl8CLcXmNRS/HDuAmcYBb+zhh:IcjJ/jXmNRpBlUt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 4384 msedge.exe 4384 msedge.exe 4444 identity_helper.exe 4444 identity_helper.exe 6040 msedge.exe 6040 msedge.exe 6040 msedge.exe 6040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4384 wrote to memory of 1616 4384 msedge.exe 84 PID 4384 wrote to memory of 1616 4384 msedge.exe 84 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 4208 4384 msedge.exe 85 PID 4384 wrote to memory of 3580 4384 msedge.exe 86 PID 4384 wrote to memory of 3580 4384 msedge.exe 86 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87 PID 4384 wrote to memory of 4688 4384 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\7c71f2faae442fdbb48a5c2913139c89_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7eb846f8,0x7ffd7eb84708,0x7ffd7eb847182⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1920 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6912 /prefetch:82⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6300 /prefetch:12⤵PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,11301214155900174525,6837617787176620196,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
23KB
MD5318ffbb8b70b421abc02996dcfe8afc3
SHA14240e64a8604fa36481bf24471545a2c7c10c89c
SHA256fba866aea3cb0fce98cf10cb57975933d6cfaaed27f9f25250008814c9bf8e95
SHA5121a0f6266836348c4ee0fbfdfdc9197b66add2a5b150ea8a1205b4e3876eb5c82d7404bd26791de29ff48004dfed187d9bab5a9678dfe1c71cf513dd49abacc56
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5ee6c7b9a09b0d3a7f77be8246f2980f0
SHA169b6d8b0a77292d30dcbcb47b354bb9252a0ba0b
SHA256bfc800b82352c66262eaac9e2779974fd2c57422e2449d0823b424bb6e73a1f3
SHA512b28c07758d99cf5aab1c3ec605e5489c00c066f71c00dee27f6322bc5928c3317778b2d86c0bce7385bfcdf7275e2264053987233eedce7669881dc4ec65f9ea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD535ed3081c45ba74cdc0d66525cb9fb01
SHA1b67ceb9f1cd2814b38d67cde67f7474b7aa0b518
SHA256604f8cf0884f0aa660684e5d925def49570eaf6505055f9161f04b1475b212ad
SHA5120240a1837f9020b00bfb8348cd971dd4eb9bda57a19106ea321e09aa286e5ea43fccc9219d902d581ad315b7b4e56388e9bc44c72c97a5859d735bbca1eb793b
-
Filesize
1KB
MD5bd138d3a91852064f7dabe284301521b
SHA1ceb7937b08bb266160c11efd81ba8b3474869609
SHA2569383c2069370c6b7d31856e25f91e39b7aa977a955fcf78905c9fbafcb1256b7
SHA512058828ff57087e101047da590f810ac13ade334100cbba48b63611f8e35950d7d63c0aed6da4a6727f5eee58631a8aff7e94dbedb878b649b4b50e63f3633488
-
Filesize
6KB
MD5a145a9b859183daa2834c6ccd254e8d5
SHA1d5a84c6a61728f51320000a1ab6c3ca52e0c1428
SHA25648975b2a04865be8d6576c2abebc969eb6247c82b4545b114d9d60ed95c69839
SHA5120792a87b4bd504286d4d84475c10d376674724162aa6a70eec7f6bbc575f663d5f312d6d3d3a8789f322d216db46815afafe54a46b3c178a554926aada278d57
-
Filesize
5KB
MD5169a5e597ec34df7e80bb9137ae7c587
SHA15fcc6d03d7787489588fdc406fbfca2a5a5b1b79
SHA256dfd7373330a49914fb2189cc915ee6d497c4fecf413e88c0abb35c2bbd65a3f5
SHA5125173c447132c86e92e76543111bd4a361296d73be7133fbc36e11887904d22816df4ee3e727bc035e3bcbc881419b8aa5e47cbac9eebdecd7932caa1d71089cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ce5fc8ac-fa3f-453d-b284-a774aa9c63e4.tmp
Filesize6KB
MD50f25a2a673a95df05e69d493f0cac0e0
SHA128b723f7226a22636846f250e11ec3e1bc26a3a9
SHA2563374c26f833a470fc5bb7c8857ece21555257d12809ad272a7144309e254d2ec
SHA5120a15c8a7f8e486b5282a22abad30d91ed86803ed55ebe96e511f0809ee1d340739f11d9d96608c3ef0b7c354cb9d159629320b7db49986ab22b4f9a72d989b70
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5ac89e0ca128ab56f9dbe8b0e73ce8292
SHA1a127ef8fe0500207f7dd9355191569798afd1f2c
SHA256938e5fe451634c78a61ecd3b6773bfa07e1ac99ee0e5a8890f9832f9c0dfb8d7
SHA512b4b7f4c50a428d1b1d78cb2f5f977365f634532139a395d453397b94ecdc4c61cdfe1171b523e88d019d084120a22062e9d1c822bc7df1eed90ecf7498726936