Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
32d41de50256133d0e989b6eabbc7f17_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
32d41de50256133d0e989b6eabbc7f17_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
32d41de50256133d0e989b6eabbc7f17_JaffaCakes118.html
-
Size
175KB
-
MD5
32d41de50256133d0e989b6eabbc7f17
-
SHA1
341e7a55c31d56b641d0bc645c67301cbd352081
-
SHA256
3e143af60b627373f12e603a1ca41514a30fc826bf2b29bda292b33f21257d62
-
SHA512
6201cb23c3e861050b00b6c7d234878cf33accf49b20fe16618650281d27c5d2af97d89895af844c4a6a73eb434ad0a3b07ab51ceed6e578edfd03394ce6805b
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3AGNkFSYfBCJiZ++aeTH+WK/Lf1/hpnVSV:SHCT3A/FjBCJi9B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3988 msedge.exe 3988 msedge.exe 4968 msedge.exe 4968 msedge.exe 672 identity_helper.exe 672 identity_helper.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4968 wrote to memory of 4128 4968 msedge.exe 81 PID 4968 wrote to memory of 4128 4968 msedge.exe 81 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 4908 4968 msedge.exe 83 PID 4968 wrote to memory of 3988 4968 msedge.exe 84 PID 4968 wrote to memory of 3988 4968 msedge.exe 84 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85 PID 4968 wrote to memory of 4336 4968 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\32d41de50256133d0e989b6eabbc7f17_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa463d46f8,0x7ffa463d4708,0x7ffa463d47182⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3072031476461623689,8714294426513706189,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5b8db2ed57f3cea566ccb43987f1fc226
SHA1798f0dc0f00d45e2667dd7c52d736a2cae198ca4
SHA25689ae0e83599319b14c09f0679a8d68e143f588f3d1d3e6b79ec325fcdbcf5e06
SHA5126cc2c76649c49ac0b52fd321bb869ec8667f5528302da773a6862b32695f99e5241cc774e3324d31840de5b6aeba7326c09e4df0243bda73223b83d3c2508e9a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize72B
MD517a503d7db578d7cdb810bfe6629fbd1
SHA1b1902417c0d7b47042a389b740527b2187c676d5
SHA25663dce87f4824f891b0bd192bbf10bc6733acc98f31aef7ac658738c9ff0f439e
SHA51240cedf7579ecb46da377ec9bd5ea639b82a26d4863ce0c974ac1b306dc9088418e2e5288884e42550bccb53a04ca19764a8cc3dbe4a0447986fa279f383920b4
-
Filesize
2KB
MD59702ff9a5e127131933597b2a4f914c4
SHA1f360244e212bfcdeb3e4744a1f50c80a2a7a302e
SHA256e283b1a57b7c7e28a3f7483a00c5a7d829a54530091870deb2bd6dcdb4d131d5
SHA512250bb867260be741b69637c2c145dcf0f6fbd5b9ccc5dcfab007e3fdfb71637d8e2de3daab5261083de3a49f02e034adb2c72adc0865e98d7ae3b909951527ed
-
Filesize
2KB
MD54bcc388f8079c3b37c06c8376cfbc3fe
SHA1c7685b41d3144e9435cf560e5626178c1978db62
SHA256f7cdeb5d1dc908a827348a0e7a9100e213bc8605cd0e7698184dc40f290d8d6e
SHA512a5fbcb52974a18b46f86cd670312fbf0e23d5de9a8451f9aa8663b73fc5505a7a37098ccf24ce28d8d742d33b31ac125aa6bd3433576eed2baed061049b5b014
-
Filesize
6KB
MD52f729a1c81342e0be12db4a96b80f92f
SHA1264a56b8ddfd8f97641495c9d56d84420fad8fd4
SHA256e18fd600000e5ab4c0cd504f3ae5bed3ca3aec2ba8ec99acfdff2b753f9911a2
SHA5120b781395477fdc220f48e7d8a57a43060ba1384ae6c8a41118c9b7b85ab089e98904d13ea26dbe925ad5e6382663a2c25d57684e5c62f25ea21af00797f7402e
-
Filesize
7KB
MD51c0b0bdd6290122c9a88c19f96c90a13
SHA1ac98870b2301743bcc0e80b5545046b3cfe7d243
SHA256fc23af2ed3168f0539a9be83efcb56c77212311fb0b084fceb3461a3f22c9c85
SHA5120d43e2b9e17fe266721f349f91bfd2c48be95ea0853583a61b0c92ec487b2d43723ab582e6a556be23a939b51034c3302333ba62754baab37be44e9ac162ce63
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5df8f4d24981d3ee8962fce4b280f1c7a
SHA113b12f277c3c4b7605a79a9a226671677150440d
SHA256d812cb11bb8da0e49157b9a69d3df1ebacbc45c4bec7bd2994614328c308b6f8
SHA51236705e59fbad4058fffee7af73137b4de8bf4346e2de4610eeb8bd9cac4cd70a07761742193145017cb5dea4175ead2b6bb8f2f64aad401cf4c098d759815744