Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
6d0afbd40b19095ba647738bc77630e7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6d0afbd40b19095ba647738bc77630e7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6d0afbd40b19095ba647738bc77630e7_JaffaCakes118.html
-
Size
30KB
-
MD5
6d0afbd40b19095ba647738bc77630e7
-
SHA1
ffe2d2d4920eb3e96ec3626a22b4f0d7bda1081b
-
SHA256
e8fdaf10d06c1b9e92c3e872c669ecfddaa4d9c6c4f911543bde169b58ba0996
-
SHA512
4d128e2bd7d377453c96e389e91f9f8c012e2283ff129ea36549656c3c29185a570bdc9c70f2f98fb6d01dd4cd9bc52b6cfd4fe2cbdf8b361895a6627d45dddb
-
SSDEEP
768:13fc0TN5I5bZJpU3rDRk6a5j02bNrxEB7JndIwF6JQsWxpkfLiC91Q1KzBPQVBCq:13fc0Z5I5bZJpU3rDRk6a5j0oNrxEdJT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 1648 msedge.exe 1648 msedge.exe 4240 identity_helper.exe 4240 identity_helper.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1652 1648 msedge.exe 83 PID 1648 wrote to memory of 1652 1648 msedge.exe 83 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 2352 1648 msedge.exe 84 PID 1648 wrote to memory of 3276 1648 msedge.exe 85 PID 1648 wrote to memory of 3276 1648 msedge.exe 85 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86 PID 1648 wrote to memory of 4588 1648 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6d0afbd40b19095ba647738bc77630e7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff825a646f8,0x7ff825a64708,0x7ff825a647182⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6288 /prefetch:12⤵PID:5416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,3448566960300445076,9399785283856810907,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5512 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5bf7545af0419fe9a05cf28fe0b8d8d36
SHA15ff1e96b73c43ddb53431efb4a9bd5e761de7c59
SHA256af7c9bab13a1ad7dc3ccf16909637848edafa2dd42a476b6ef0a82b02c7f51d3
SHA512c4209d56a7c9cc9b400c3be525c96fe03fa0a855dbfd2c9b07a789c5bbc0d205d23a61811f94b57498854e0aa42b035bbd198db335eed81823acd846be5e82f6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD520d954ac149f4bc3d0bdd01c21c97783
SHA1e5dcf4fd3e9548147e30c46f93608be80221fbc5
SHA2564ff023c52fa57859330fc0405b495ef982d325589c458c21530b87c3294b6a15
SHA512ec4f5fee0e543d58ec9b82b42b2e95b20a3baa661ba28c515ead94f006fdd1260d40739947cbe3dff78e4cf8950a709a3cb81c83de940b4c172d46684fbc7bf6
-
Filesize
3KB
MD59e8b8c8a8168333302b75dfa27144f56
SHA15dd4fbe63960d7dd77f9124c2556fd8aefc0417f
SHA2567f5e07d1c50d091eaece950a5e6737bc52733930c40b205feb86512e70e56aad
SHA512a0cf836e78759c944e5117dc37104467dd4b120d6f84fad1ed65a41af2edc766de0977aeef1beaace19ef346c93a4950a029155dc00a80e2571a399c362e242b
-
Filesize
3KB
MD540fe967c231f4a970f9607424450273b
SHA10238129979046d43e491d7db9e23685404c800bb
SHA256d10d6c6fe002e3ec7147b98704ad60eaafaf7c24d76d5bb6f619e04b45c4f10b
SHA51231abc8bed268e14df5df2a25c3d763502c3a9b64ae6a2013139fc42e9b1f61f37c3edade4aa83b5b8ef32f767caa671b4daed41300f80c7f579aafbb64c45d49
-
Filesize
5KB
MD5a0e661ffc3ea3dd6e513bf8483d7472f
SHA12275fd8fab4af4b2302087e20de1e3f575aa885f
SHA2564a1d271fe0e44a40b4a71b1e36f8af317ea0cdea2816e71235e76dc494bf0335
SHA512c70d767304262e59c6e318590c50fdd7fc30563b41f45f703375845fe3e29ab6af8c4c58f5027f75f2f86a7cf191ceec3b4c5b3bcebc90bbc517c4fb9774de50
-
Filesize
7KB
MD5c6599f834dafbffa714c5242f8a919fb
SHA1fcbf1df5707b3e60f354fee4b72cd5f45419c5a3
SHA256ae8152b2d3c7e0fc9304f1ca48ecb2edacedf2a6f4814c1a43c02031eafa3009
SHA512a88af30961f1e03e082b448a9b4600e94112f34f1b5e4cf1bd83581c1132f80c1fdb62641ac71b29b884750eecb5ba5ce8c99aac3a452e289aff5b7dbeca8202
-
Filesize
7KB
MD57c607d89b49025b224688351cda8ddd2
SHA1209b272ec0a211d1eff52c5b9551c6d870b862f2
SHA2563f2ee1cfa93b1c117cd6ad2be3d37ba31a2fa42f1c85dc5c5a0cc953bfd470e8
SHA51278a864483c0adea66d661e5b96c10f7e7ed12f240c8a5e92084e7b8d2b684aa75df7ccb5dd548c8b1786fcac6ee69f64344116a34ae0eeb96406c27c73903bab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50b6dc6d59f8d35344865ff36e8ca2da7
SHA1127ca9123b1ba706e0de34a87e38202aceea6f90
SHA2569418b1e33afb4f96baf65d488d1efbb6b8fb27d03e4d321d75aa4fbad40d0667
SHA512b28f698665f539d4964261e212ddd746eee2727d56919f9c87604cbe39ce4ebf170163e40655390ee17f8ca06b4da22cf03ef45e9b3ae8866c0a2636ec1ff502