Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 04:00
Static task
static1
Behavioral task
behavioral1
Sample
5d13a31032aaef28618084ed82e9eccd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5d13a31032aaef28618084ed82e9eccd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5d13a31032aaef28618084ed82e9eccd_JaffaCakes118.html
-
Size
175KB
-
MD5
5d13a31032aaef28618084ed82e9eccd
-
SHA1
9cfeb9b9596608ceaf226c77394138295af5a13d
-
SHA256
6d0c95f96c9619d955fe949c2d7d3ec007940d0d9d0ecf19fb10ab6ac0b26db3
-
SHA512
a2849537020d4ca3db8b951438293f296620a07858960fb729fde73051dd8ef1fbcdf1c4bc86182235f72e7c318c1417c6e6992956778013ae7cc167f77662e5
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3YGNkFBYfBCJisZ+aeTH+WK/Lf1/hmnVSV:SOoT3Y/FUBCJiVm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 4012 msedge.exe 4012 msedge.exe 4964 identity_helper.exe 4964 identity_helper.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4012 wrote to memory of 3496 4012 msedge.exe 82 PID 4012 wrote to memory of 3496 4012 msedge.exe 82 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 4516 4012 msedge.exe 83 PID 4012 wrote to memory of 3400 4012 msedge.exe 84 PID 4012 wrote to memory of 3400 4012 msedge.exe 84 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85 PID 4012 wrote to memory of 3432 4012 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5d13a31032aaef28618084ed82e9eccd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc763c46f8,0x7ffc763c4708,0x7ffc763c47182⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3896 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3808 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,8740284391575600190,18062198278914134611,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5fc06c103454e4cf6a41575cde1599f13
SHA1937f2fdd1496fcdd42410ac4c405c23f8a41bf0d
SHA25681583701a54636a03ac1c7dfd1d4ed558f27b7403da2f674b8b78ec3e2fbebe5
SHA51253ccfb35f2338ae7bce037cc9fe387039c4e56d19eb34913bff7636be8516e38920fc1f912ea0cbc17d72cdd6ac7050a977acfbe959a28324899dba9f8ad8234
-
Filesize
2KB
MD558827ed7bc76fd8a9dec94b66e05b04d
SHA11363898d6d6204b7c0e04e32101432701596c571
SHA25687b63b74f6e59208a69404ac7429157ff5f73084c47d9885e18f01ef122c5d99
SHA512bc90e3dd626c1ddf415e6095dccacbda0f7f6a44bed1ab3f28ceaa28d7e351ec1f8e5d4311c40564cfb9d7d3b903b6fac415160dedef4253f213c90cad181256
-
Filesize
2KB
MD5c084c7bb6b6181479f91ea81d6ca3dcf
SHA1c1a67ba981529cecdff7b054b633a791fda63668
SHA2561f9a45f2da2445e19740f1e9f959d5f427ab6171d2e275f04c91a0acf651b7b6
SHA5121818f79b284a7f6d158a5cd259af7999170353fa3fcd3f34129ac763b4c2bd031eef005047215139640b0ef3bdcbc13ad99239594c9ae44dcbc557ab4071047a
-
Filesize
7KB
MD53d402161064100e1107011edf3b76043
SHA18a9764e984cb10eac81511839df5397b76532f74
SHA256e0f147113efed8ef417a90e9a313ef8233ffd8c87408d891ad20403228d6290e
SHA512cbbe0e4a31112d40bd6798af9c2b85158a4faa2c7428fdf0e579049c9327c5316266e87b28f25cee8c51de0de9d5d3e2a5527c8c442d37ad3a191a6998fb8241
-
Filesize
5KB
MD569b46e7c117475885666b1955d8edc5c
SHA1b9f808454f116932cd7ed3fa40e638baa50e519e
SHA25690de5e6fdd56926264d43b09286e41a2dd3c6d71de0def58d2bc1a1a1b4645d9
SHA5127ed511f1698de32b27b1d279b7fea58d4364493c007ab8867446ce27cb60ef3131961b6e0f40c1dd32adefc8a6efc14f482caf2f49611cba07cb97d0ec6b684d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD593c2872cde7fc267db993c7ee666d9c3
SHA1bcd469690a747b8b546491f09addfd0986df9c73
SHA2565f7f6c013e471e2bb48fdb31c8453e17d931de12ab9a2f6760039499c3eef923
SHA512f1fcfbc899be6648b6502085639fcce4a2029b9a21fcc6ff7c6524d962146d437dea662ce6a3047cad9a78cad810778d045bbcdb5aaf0724278e3ab214b9c726