Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
ff5cae940738e03ba41d76a00e1ba9dc_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ff5cae940738e03ba41d76a00e1ba9dc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
ff5cae940738e03ba41d76a00e1ba9dc_JaffaCakes118.html
-
Size
125KB
-
MD5
ff5cae940738e03ba41d76a00e1ba9dc
-
SHA1
54934be3e39a77557e90cb688b3c1e494fd47573
-
SHA256
5bab141ac21e97efe53426fd2e41658404d153805cdc6d74d4ac2436eb439977
-
SHA512
94678f86898c60005610c4ea08e54021a5c689e5bfac0ed79c41e8b97e24fd5cfd22f92697401b67c86e84a0811b71eee9fbaef065188591c61c2a3d60fab31a
-
SSDEEP
3072:dUfCWDxYxQ2PDxYxC2T/Z1snoExHw7SefhENE/jzCqezU+3zO:dUf1DxYxQ2PDxYxC2T/ZNn5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 2544 msedge.exe 2544 msedge.exe 3816 identity_helper.exe 3816 identity_helper.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2404 2544 msedge.exe 83 PID 2544 wrote to memory of 2404 2544 msedge.exe 83 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1944 2544 msedge.exe 84 PID 2544 wrote to memory of 1128 2544 msedge.exe 85 PID 2544 wrote to memory of 1128 2544 msedge.exe 85 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86 PID 2544 wrote to memory of 2428 2544 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\ff5cae940738e03ba41d76a00e1ba9dc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff0cb46f8,0x7ffff0cb4708,0x7ffff0cb47182⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6276 /prefetch:82⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,8256526648373301330,12825702306508993772,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5436 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5e744f59884f3c606c7ad07f4d0bf44b7
SHA1f840cd52893e84356c9eceee914b4a8e36c3003f
SHA25617eeca0983d77639da3033bfc6bdf2ce88bbf3de130686c570bbca6d02ab27c8
SHA512ee2ed69a7c082cc837cb643f5a1e29b30b55a8b6b891bcf7ea02ae707caeacd988acbb6e1e7723412c9846269eaf621be8110630f4d3024695ccaa4bc34eccd1
-
Filesize
1KB
MD543cbfa3e552daa9a22490c2d0c9f5e5e
SHA13bfd23c6898493e40e1e133cf3cffa9d4abac9ca
SHA256ab51f484f7f3e0a3f20930256196c0330a0bbfb057df78872f8ac861e978ca9a
SHA5128e17cdfd989909e4242ce466ac2cab7b1da5dbe1bc9f7e983636f376222d63dad3348f4fa963e42f792f65c5ab5bbefd531712a67de5294c41acafe90f231f41
-
Filesize
1KB
MD5230b85693460e4659d9ada1eff1f3bb3
SHA1759504a5a9d8505cca15a9fd768d8103cd854122
SHA25637344c4e5805a0dc2dacd192a71cc257d55423fd03c5573ac48273722dc9f4e4
SHA51204b6dbc06d1173c5b5f0f856a4450842334a3d46652acb59e3377b049c4b140bd3cb84855f0055e5831899eea6de124b495826395f2d66418455b0cddd679947
-
Filesize
5KB
MD50519d8774d1afe16c827d0deaf2b990b
SHA1f2341e881dec5cf60abe55f01c3373e801886c79
SHA256243e237a0c2f35350d3455b10995dbd0a4100d06c486fceff4d8fe442f5829bb
SHA5120dea8c114cf19dd52f76fd076e42b27ffb3637c8aa984ce357d38ec701d8042f5eba1f582fd5a5ecdc131842bbe4d2986d860e82f420dd4d54f41e14fb2aef72
-
Filesize
7KB
MD5b4c26d9f09c4d021da7b5f96928aab3a
SHA1723b26b92321476ddbda1e9eb7219f47284c0b8c
SHA2565839f4d680082bb9b7d880a8ac0a097db070ed489531fc18bed21dfcf57e716b
SHA51258f38d730a332d4658dc690ba98460fcbfb282e538b4acc4e24d366893e451a0afd515d7260ef77ec325a7dc0604bea1013f700c3971e61761b117ce53b5c73f
-
Filesize
203B
MD50188541fb4f8bbd37fbdd15306adf369
SHA1522e1ba74ec7dfbefbfba4a8b43b62a9f4761034
SHA256a89c913b1cddd10d8b72d8bc3be1b6527c2f5f5a57cbf533f828a5265ccdb71f
SHA51234c015b4ae4d7d3bb776d8570658e6378a2a689f7f1ca1d9e9fc8ba335c6762cdd8e5823161bc52ad233d4f88aa3fca3a9c5a4080cdc3a8d3af25b4c0ec6f17e
-
Filesize
203B
MD5dd9b2e78c6885be8e48ee319e78a8377
SHA1f3f04e1e9fe38da790155f0d168e8436c309a040
SHA2560a98d9de5aeffe8618d742c12b63192e8218209fadb07f87d6f1c435d10193a0
SHA512812463bc2ffd05b9ea041cef1117104196a3db720d950feb49924bf0e92bf618291d53bd6cb8f7bbf569a209325f23959b942f3513933d18552cb0b27df9ee71
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD54a997180a3e06ca5dea5dda8e301d798
SHA14abce01d90b544efc82c4c35e241c4621427640e
SHA256f08cadde7ab54d4ad760a921e0a7813f97be0b48d18ac242edb804852340af7d
SHA5128e14f01000b4d7307766746ac34f51e5e472eb682de9cd1ee342b3ddcb5f891116a58d7d7cd9f26ca29f0214b4404afec5ff0a04c2875208e89521eceba7337a