Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 10:03
Static task
static1
Behavioral task
behavioral1
Sample
45a971b06a47556aa7b723de0651616f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
45a971b06a47556aa7b723de0651616f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
45a971b06a47556aa7b723de0651616f_JaffaCakes118.html
-
Size
175KB
-
MD5
45a971b06a47556aa7b723de0651616f
-
SHA1
db4f2d5915026a7f44e9c940f27f06064c1264a7
-
SHA256
f6ea21822eb95453f214b2db5b9f63ceb9590e63df4ddc382a1337dcda7795d8
-
SHA512
ed8fd1703f03546ff6cd9db03ed7bb25d06cd2dd1ab8ed759afd3f1e828acb4cd5db3eea90c46ecdfd38a780d7eebcb1e23400416b52b519eba6bc7e170e4755
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3fGNkFjYfBCJisB+aeTH+WK/Lf1/hmnVSV:SOoT3f/F6BCJidm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 3040 msedge.exe 3040 msedge.exe 3004 identity_helper.exe 3004 identity_helper.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 1712 3040 msedge.exe 82 PID 3040 wrote to memory of 1712 3040 msedge.exe 82 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 4648 3040 msedge.exe 83 PID 3040 wrote to memory of 1512 3040 msedge.exe 84 PID 3040 wrote to memory of 1512 3040 msedge.exe 84 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85 PID 3040 wrote to memory of 4280 3040 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\45a971b06a47556aa7b723de0651616f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6da846f8,0x7ffa6da84708,0x7ffa6da847182⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1964 /prefetch:82⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16739755614443262553,15047835632291490634,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
19KB
MD580b654ce97922793f0ba65eef9460504
SHA14d9c8ee0f4046505655513161e006e9b1564f178
SHA2561fffece56e8c86c14a99d17897e0fd2173d673b954dd3727e2f26de542ac3289
SHA512a7417350d58d0984b266d850216b50c6c8a22bf77249112a9e1fc15e9d0c5e8f0b72aa9659c59a9620aed4568fbfbf9ec0db7d7f7ea8aa29d59880520c684dd0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5666b27bc75e3a738d1e62550bc3e9260
SHA1c6c6cca8035a10d2eaf5c31a7063e1511273ca9b
SHA256001c48b674cf0f72cbb6aa6897888a79643f266ff0cb88c0cccdcfd7682f6be3
SHA512e069b20cfb07bf54f4554da2eea696c377388e3d2baf46c7169130e8f2afa84267cfc42bbd422e2b82afc9e53c4a3483d84f4e6a55632ec3adc362442cca0d7f
-
Filesize
2KB
MD5d3ca9de9436897632fb8be4005980889
SHA11a4ec9ac1a3600d0be2b5c33b73716256f9b7662
SHA25698fd8faf1ee344a184c989f6f3887b9dd6b3fbdaf6b8238fa476f05151d5bcbb
SHA512e9a6184a7f95114efca2256e5845420c8cb1a893509523f49b65fc516a7cb3a975ff2f236329b59072fba195739c8dc7ff82c0fa39f5c4e23024b0dc7f8edb0e
-
Filesize
2KB
MD51d0f38adbd7567a65ebc1575c66c5a9a
SHA1a8cd5cea81917d3fd348753affc771ad20c2834a
SHA256e427496ee10c14f5c968832765a24ed68c582fc672d46849b8227d7a86b1cea7
SHA512613c38e0f8c2e786b38c6b46b6352f4e3788321a0d8d59819ce65b5907c4a3bcbe8543e6289f44ea8121024ccd9e7c7e428dda360b47322188fb4299ad5ffc26
-
Filesize
6KB
MD523885d0d734995d34f1a763339358c22
SHA1f054ed2b073dd854f55b0e53ab0a5a7ab72f6114
SHA2563558d30a3f281d09d7b7826aed57b7bc30be14be7dd3a43546b59c286623686c
SHA5121fec638ba6d75a339abaa388a7866c5890a863a995816554126e18fa5eda90b8df52082750a287ae25e957dc2063f34c0b5fd24227d66fe533a97f5c71df9cbe
-
Filesize
7KB
MD5981f2639d9cfdda394a12a117864083a
SHA101f79f1aa3703b30673adf24e9f06d16c6d83b6a
SHA256e5dd077075096f3bd028c035f9089755b4bc0829df72e43794513dd69f290a3a
SHA51226ea662fae63fd2f77b11327359aacfbda188594b004b850886f08be09680f0345a7607b1e7c57bde1590be2f96e6d58f681e7cd63c06c4d10ec18f8f6197627
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50d79f731f4dcdc3b959a63136d146c7a
SHA17253e33a9d6217ac762c002c60a33e317bd484c4
SHA25672d192c42ac33fb88b68e7b0a2b098f9fe236b733f9eec6e954dde5b87792398
SHA512dbe7e0d05ec236d3833828e9aff0618ca7945aafabe24de7f0511a632a23c9ebfde873b738aad8f1d860a909ffd4a4bb0e6e43615f6e62130f6171684e2129e6