Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
e74fe2703615ba002b4f12b7d17b64fc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e74fe2703615ba002b4f12b7d17b64fc_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e74fe2703615ba002b4f12b7d17b64fc_JaffaCakes118.html
-
Size
47KB
-
MD5
e74fe2703615ba002b4f12b7d17b64fc
-
SHA1
f5e0802c236654b0886debf1013f27546fb3830e
-
SHA256
e54d149010838ca27bcb329b52bda99cd81835cbde8135f43dcbd53049e18392
-
SHA512
b99be7bfcb8101dc2afe887db5631c6bfb6763e91c0896cca332e8acca7c678146379f2afa5b1a7a28146126e44d49911b9ecb90edc28b5351123699cf13e0b4
-
SSDEEP
768:/7lT0EipB79FAJrsh+HLy8oUegwezzmfRVaMdLvV:/JTupB79Fish+ry8oUeWzz6RVauL9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 2888 msedge.exe 2888 msedge.exe 5012 identity_helper.exe 5012 identity_helper.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2888 wrote to memory of 4104 2888 msedge.exe 85 PID 2888 wrote to memory of 4104 2888 msedge.exe 85 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4920 2888 msedge.exe 86 PID 2888 wrote to memory of 4064 2888 msedge.exe 87 PID 2888 wrote to memory of 4064 2888 msedge.exe 87 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88 PID 2888 wrote to memory of 4456 2888 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e74fe2703615ba002b4f12b7d17b64fc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xdc,0xe0,0xe4,0xd8,0x108,0x7ffe3c8846f8,0x7ffe3c884708,0x7ffe3c8847182⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7084 /prefetch:82⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7923307757352287334,3771959797354458911,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD59bef86fb82f67930ae7045128ba99940
SHA1b1369760a632ede1359562f287f9e4ae4ee8da3c
SHA256f9e80d14dd785a4c28de6308000ec2eaedc665e1b33f3da7502f06d6adbad1ff
SHA512e873dc78beb9790e058de8f008ab2504ee4cd94acf790b706a90b6a22fc431fc9c207ed3ee7543a1ac51084188a4b4f964a56272472e8f31818cbcb8cf98b7dc
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
20KB
MD52241efaf8a5d6561e64fa7e97dd66e78
SHA17b1f677f739c119f878cf3a31e02c2af7504bb54
SHA256e1e55887f81363ce752f53f8c92a155fe041292b48148134018a0476cfd8f204
SHA51278137eb3866b771554b70ce90df1354cba5990602018ca677fef64959188fb40a4c23edcb8faac9367db57d0a30cea61a52cabeec10114a1321e9488a8543178
-
Filesize
132KB
MD50c64565bfe2f2cce29ad1286489f5213
SHA167c237750c866ada366f16b82cdcbe6d2f15e558
SHA2566946e80b40cd4062d31f049f4305ec4c0a1072733b162763bf9466dac7a2f0a4
SHA5123b62e27fcc8c3c2817b0ed1dedc7f6ac5ffb492083916398b3a580aa51fc2eb69563a4a1195ee3328d7e27902fceac83d348c8acff71ec3f2db6d7ec8464a6cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD546d22a52707d7c2b3948a51c14a80788
SHA13de6425f6a996309b9882daf03c113fdf50fa84c
SHA25606fe99c3de57b056203b3bf4173f4ddf829f44639e4209cd2234e48278894c15
SHA512671afffaa38f49ab01a3a4c73c2f779495b7764b2c04080cbd0082441f1150be2914627dc76e2e6f536d513092b1de5ce2be1b5f63265929a142b1161823ae50
-
Filesize
2KB
MD595836fe7f45081cc143eb9f0aa3b79bc
SHA1f9cf3bc6f4ac96b5fc38f0a908788f3a37336120
SHA256668fbbf256c59a9eee6e4fd3d1dd0f9de0f43a8b9c6ed5b8594c49230d85724f
SHA512bd37b8e4b3a9af3ff6aca7cbf49d4d34925d90c0259dcd936ab4aafa262d8682889570a6ad66393fe65339dddf04fbb29974a69d880df17d1333be3654c24163
-
Filesize
2KB
MD57e322a1a2db84b2f89a7f04ce94f9aec
SHA194b5c9cce6891d457b2415e14b5ef01cfe2c9627
SHA256d1e563476b2567b1c00c31af85e78499405b0cd8bec2a2661192db125947a6df
SHA5120439503ed12c6dcb7338b450c63c02b65c6b0a5468ccc280679a7c9c625e64c9f3a503d1b084db192bac88bebf07dc1f7efe18c0bb34db6911f2189cfbee44e9
-
Filesize
6KB
MD5cc40245d2a6a2d62d664502b22c7f47e
SHA17277174b9b8946e7ae37949e240e48950626f938
SHA2567d851447b1993fb83d78713f26afed2bc07d3740ce9d906d7e24b39a84a841e1
SHA512cb16590135c3951042be5c3963948f6256a03d3c802cf70ea4c29683b8212042af470352f07fded129d7dc0d2582df4e1be25fdfbf00a7977f0d144f12bac2ce
-
Filesize
7KB
MD53af8bb69efe09db2fd710cf3918cc081
SHA19a14e91d44ad0c85696bf749862ecdb14e20b782
SHA25606ab5d053ef9b2295a8afa65d7525d8243fdb927485dc9c60e2be251be45e531
SHA5121d18b593e848d67b720a7511bf9d6868527f61e00aa24a420f411e106718a94c97c6cf843f752fd7d46f7fc3d36f5cba50ae631c393940d3efa57b055fe93384
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD585bb796c6bd06f87116b8814189d9283
SHA17df8dc9d39d7b5c884464c53fbd9df9b8ee8d4ad
SHA25669593044eda4f31f29f895d8a8b25485607910cac5df373ea38c265243519be9
SHA51243534a228c9e2ca861d6ee6e993cb2200e8bd79e6dff1462caf7e64e6ecdf2745fd0633a7e4a8a67f224aaa728c58c5128048319726d8225a2a3e24eade2e6d2