Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
3a2896f5d9e82a1975796a3ed2a1c2b2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3a2896f5d9e82a1975796a3ed2a1c2b2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3a2896f5d9e82a1975796a3ed2a1c2b2_JaffaCakes118.html
-
Size
175KB
-
MD5
3a2896f5d9e82a1975796a3ed2a1c2b2
-
SHA1
0a8b80ae05693a8dbbdd9108493b709c6aa023a0
-
SHA256
162b375c0e239824079bc6e3186238e05df2918e47e4de9905a0fd0fb1e8b3b1
-
SHA512
baf0127eef647559e284f836e24855582c0dd667fef78a0a5366a923a07d1c71d4df2d9b748fc2ea1f9e1f1e75b91c9d3346e8186c7f7d05bcb4092907a7fc55
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3cGNkF5YfBCJisF+aeTH+WK/Lf1/hmnVSV:S4oT3c/FcBCJiFm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1836 msedge.exe 1836 msedge.exe 2180 msedge.exe 2180 msedge.exe 4316 identity_helper.exe 4316 identity_helper.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 3144 2180 msedge.exe 82 PID 2180 wrote to memory of 3144 2180 msedge.exe 82 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1628 2180 msedge.exe 83 PID 2180 wrote to memory of 1836 2180 msedge.exe 84 PID 2180 wrote to memory of 1836 2180 msedge.exe 84 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85 PID 2180 wrote to memory of 1224 2180 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3a2896f5d9e82a1975796a3ed2a1c2b2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9278146f8,0x7ff927814708,0x7ff9278147182⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:82⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10490611675394281435,13778294330560932180,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
46KB
MD5ac83857f0497a4a0e7669329827cf228
SHA118ea483c966969e43a654fcadea9719a8aca370c
SHA25643337a1354f376890cdb73f3dbaf95a8027761c574c30cdecb321096be485d3e
SHA5126a35c50764d31d4bac07ddbec2329238cd04f2c58c00629e523ae7fc2a7d6be5d1226f8fb6c3c1043b215c38c47951a66fa8a9d4f4d6ddce7664bd1d011db2aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD58b48475b20b8dd30c9020148e4d6e263
SHA19e4ca74151000f0daea228056fc42acded3f0aee
SHA256f9546c4c189b517309a853434c33fb18bb09949da042353293eb9044c8c5beb0
SHA512521c898e55dd43f51b6b73af48b774141bc4a8f784dddaf6e62cd71458637ee7822f03c6fffe4f1e13944fe1c02cbf95d66ce2617ece6ab31f6827bdb4e77efd
-
Filesize
2KB
MD58b0baecaaae0cee482fde110d77bfcff
SHA176e2c497c146ee27e88fab8acebb4a34a5469696
SHA25662ab4294f545bdc1f9ce43e08bdbc69e42708b03fe7763215cf82ed38b61d3e9
SHA512c5aa4b1f8df50e530e5d1529355bc3848cd94fb389c48abb4494a6d28f95b33a313b5ae302d3102ad8a454458b3dbe334e30b3f46aa4e91814cd9c9bf5ef92b6
-
Filesize
2KB
MD5c0e794bc3753b77ba665e5080d60f145
SHA1b27ee8b026025faa9d4918d6a86d594c85654488
SHA2562ac67140b06810c5ec42461eda7e602b398abcae17d4a8b3ecc0241427610dbf
SHA5125a2b1c24b44c271c3edfe3adb0d317b6469781a1035b2294225eb00d6220da740a9113cde5664d16fb6a8fe22c1477299b602af6edc425799605dd0501fb125d
-
Filesize
6KB
MD5d42478afa92fc51c5c11683af25ea181
SHA128eddf3375332d83e2194c7ff10313c459fc3c11
SHA2568c32cee9f3e0948cdb9d333f076028d6246e40fe1663bbc40bc8f7e9f402dfb8
SHA5120a129e7fb4177ca0f406b414d30e9e62bac2910f6abb196d401a1859583c791e99c7a72ab281d94e32b992fc6c45c9aa5073073dcd3ddb08025e89f3c1b6f2f7
-
Filesize
7KB
MD5183cda214806eec48b6889c27c0652ce
SHA1d61c4207e4c2b4f9621f6a0883782491b91c5bfe
SHA25670a1f7814118457048b737d4abb8675e515701d10f6d1f95807500f232198ba2
SHA5120b3aee299e396ef15480f9f66f16b8d1eb04facc8835b96eecd80cf871d1fb9942160be5abd3f374cc76cf523f7245653b046b20067078533756a1b0f9389517
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD557624144b236adc0b6262bfc190c6c15
SHA18322c92f5180f6f94a8ba3b1a58985c4fc8d37f1
SHA256a893e4a9911760abc1e22e4df701b794b3a74354d9e970233a1eb105700441bb
SHA5127aee6c16115715b0d0e2d97af1bddb7c8b87800c035acba310e2b7098a6a23c21f86e65596fde258a7044e622bcecca5dc2f518d0c7c80d1336943233c16ec78