Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
6bb52881acbc9d26631672796f64818a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6bb52881acbc9d26631672796f64818a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6bb52881acbc9d26631672796f64818a_JaffaCakes118.html
-
Size
66KB
-
MD5
6bb52881acbc9d26631672796f64818a
-
SHA1
8b559382514d427fe89a79afcb85309a578e8d52
-
SHA256
04074696efbe7f54805ba5959158e9ec8526c4bd74349f810415fb92d25b073e
-
SHA512
33f747562bf4cb1f3c4b3b100c189622d771e69d2c6d46dcb5ad6d4579976e60982d606dd3a712afe9e92de51ebcc3fe63f09f2602ee9ef90983567f4e120fb1
-
SSDEEP
1536:oYDuMXfH/iFHEWmf9b+/pElNscVEu04LuO+scVrAkdscVEIBscVeVXscVO/ItRsh:olMXfH/iFkWmffqnTuAwNUmGWY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1952 msedge.exe 1952 msedge.exe 2188 msedge.exe 2188 msedge.exe 3548 identity_helper.exe 3548 identity_helper.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3444 2188 msedge.exe 85 PID 2188 wrote to memory of 3444 2188 msedge.exe 85 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1364 2188 msedge.exe 86 PID 2188 wrote to memory of 1952 2188 msedge.exe 87 PID 2188 wrote to memory of 1952 2188 msedge.exe 87 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88 PID 2188 wrote to memory of 1028 2188 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6bb52881acbc9d26631672796f64818a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaef7f46f8,0x7ffaef7f4708,0x7ffaef7f47182⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1468 /prefetch:22⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2148 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2080 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6500 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,8371866409137055733,7922374740995419321,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD58645b1d63298588505fd2ed1c96c474d
SHA10bda07587eeac6d9abddb1707d7cd7799e735e6c
SHA256f1aecdd8d3f83549b93a7fdd8221883a6be06bbd8054f52cdb98d9923474c30c
SHA5129da2229797f3f5d0688128627192dafa98fad2f641811313b82441dab49144eb36be10a5844969af1c1f5021a97e4ddadd750c6db2d158509cd861d344cfff1b
-
Filesize
481B
MD5cc0226ce41f0c84312e7d3e5636da3f3
SHA15101071828b4101c8ae6ed141b105a031d0bef09
SHA256aa7f994d6a422d015bb1a690216d5e0f29a1a61a31cf92bc07eca0de9b955cfd
SHA5126de407bdeba4949fafe7c1a1fba3b4608d412d1eb6d32c1d6e7b18e60b7c3f445f00862ffa6e4526267f6f2c96a6158ecf601b1c897321d9f687b0ae514caf42
-
Filesize
716B
MD5ed28e451a76207b87c28692100ca7ee4
SHA15476da58b9fb6b002e805bdaae4ecf3e78b115e3
SHA256c7f148b6bdc42592927663242509961be7111bb67b1d255894805a6c334905d9
SHA51260cb2a9c3e78c047a62f15026805537f3747c9ee6d36feae4cbbc51445c7236baf1b92d68917d43b9928d26d966c9a4717964cc178d57298e3bb0d9304d891ed
-
Filesize
6KB
MD5da3b4dadd72c67d4bf76d919dde465d1
SHA1d42a446541118700e7836662cbf5a42afd55de2f
SHA25674fc059f7277bccaf7cebd366bc0b6a79828812fdcd0b8c890d6469e7b283cdc
SHA512b6c210802bf188d799305d97426f2771db2174da40073a0e31d03c337a4d43d685c8d5cb8c18d448779a5ace2e0bb1c405e17b4083ae7443fafd498c6b5bd9af
-
Filesize
6KB
MD53c99a9de258f71bf23da61fb7f2e53f2
SHA101dc74a30e5c75275a1a4fa3e4f2598d6c3cf136
SHA2564abdf82f76ec8f6286223a000d7c759f130b6198cdfe83aa1b6be541e57deaf6
SHA512bb7ba7cb07627fa341f6f6efded8918ad877ca01fcd10d480256a5461c5c8c8e157c5e22503ccda5bf4bf78872d2e637785ae2a9567fe1c37db607f54bce23d5
-
Filesize
6KB
MD51b48d77513a7e60ac1e9e792829bc86e
SHA11b481e0fbabce74b759ac84d97b01ce0a1a3cf45
SHA256ba46ff2b4bce3effc016eb47ea83432e5f39d7fe8d313c38171f15d1f3e64786
SHA51279d81cf2bb59a9ca8fe2fb9a883450f60baf9334e8c9275f78c4a2e5f8ffae04f80c6cccc0f70f8723e20b15fc8203b2d43de1cfb919980f59d7eca87e34f07c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b3955834-7ffa-440d-be9d-1033c80dfcfa.tmp
Filesize6KB
MD5dc04b6354e8543791d83099fe182d993
SHA1e8e6c616729f1c6669d7b30521f9c381eb60d73d
SHA256f904f23c26c1edbe8ef91468f4f9e682863cbb3f6c8bfa337d26b507f1db5ff1
SHA51227edd779d75aed185e48dd3ae475a1bfdf08f966e3ecc88402900468ce62eee16a8682ecc91be10822fc5793bc20b0cc29d59e5859442229c93e99d9c16dca4f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5df13d3b9c59ee0e77842572cea829ca6
SHA1289f8d81fadaf36f16693418dce7ccd3a3c0ef4a
SHA2569a8a3b5a7a1a9281dea2a3481fafe30e0a35d493080a09cd17834ad8197417b0
SHA512c7fc7a8939ab0d95ec3fcad921e0d4d416924e9f4d6db5ea364add9f4b547736cf7982ff05c60206918925fe2868f8d6e837848e88a0de88b1707abfe2cc1270