Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 19:33
Static task
static1
Behavioral task
behavioral1
Sample
73062c023c25e54cac379602d2fa89cb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
73062c023c25e54cac379602d2fa89cb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
73062c023c25e54cac379602d2fa89cb_JaffaCakes118.html
-
Size
119KB
-
MD5
73062c023c25e54cac379602d2fa89cb
-
SHA1
cb65ddbb6b2d13b5f3608a3a2e9ede315ef412d1
-
SHA256
093e01b5658a768f8e146e0265e399167ad9a8a21e49d59fd3da43e3df7b9fcf
-
SHA512
d39b7e5d267d3d12b7efb467bfdcbcbfcef01d7069e68e62bcb2eb06fca3e462df695f41a34d63f7f9153190602c34bdacec65e25796a22127b54efb48714315
-
SSDEEP
1536:SoEXzuwx/xMr2NYnyJzx7oGg/jrVoDSztueRqECpOgmv70TnynQnyoquolaQh6pO:iKSnynQnyoGaGAIaviKCEm4eeyFYcYHw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 3560 msedge.exe 3560 msedge.exe 3296 identity_helper.exe 3296 identity_helper.exe 5132 msedge.exe 5132 msedge.exe 5132 msedge.exe 5132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3560 wrote to memory of 2272 3560 msedge.exe 82 PID 3560 wrote to memory of 2272 3560 msedge.exe 82 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 4076 3560 msedge.exe 83 PID 3560 wrote to memory of 1968 3560 msedge.exe 84 PID 3560 wrote to memory of 1968 3560 msedge.exe 84 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85 PID 3560 wrote to memory of 4572 3560 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\73062c023c25e54cac379602d2fa89cb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5948 /prefetch:82⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:12⤵PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1594720570484384157,34718960901427346,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2332 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD54813888bcb950c7ae6fa726e6d13859f
SHA105d15dd176c2974a0814baed18dbaed875088507
SHA256388dab67d48999c95bf49f60d1936e8b90ffecf7fd7090ec374f746637e43498
SHA512c6363b069a86c61f4d76ba7aedb4a426c2e0afd0fa1d990e1423f2dc1098291ea403975f371c3ce5e22790fc344dfbfca1cd81ce632e4dc6c896661f0bf8643d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5f042d027eb752f9c6963054c268b028c
SHA1e658ec9f95b82e85f5efb5f4112e50523fb4ec16
SHA256d18346466dd004dbab9f0e57c1177500c826eb2a3595207a814eacfec698705c
SHA51208c8c8ea1d2f5f395bc013f85e4138cd1edba6e0b6d28f45a6e765bac8a94aef04c8d3e43fde74667e314fcf2441b9910daf2ecb952a82a37dbafbbb2b165f25
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
33KB
MD54cd79dcd85c810bb747f18c8bbe22efc
SHA1ba6bc8750a6ac5f13d9bc8a9bde6ac36ac2bd2b0
SHA2568482bc1a808a0254fc0360ab59d059f07790ef0f41cebd7f588b748adc806560
SHA512318a99cf9641f2f4d9448a61bbf10286013d9d79909187ec2a1343ceeccf9b6e399c20e8d976769322649c5262d43ae235360342e67316c98d39db3348265f65
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD50f6cb194bda858ad8d9b9094396ba919
SHA15ebc003fa20aa80840934cc00082ec849ec874a4
SHA2566ac9d382c78aa2d0f5b8323329c43137535ff0e6423fe1e949ec436e12d6990d
SHA512f01cbd8c5f17f320b4f5a54c40e238b20d62173935b0823ff19c29c0bba202e425dc98074acdde612c071cb7a35cc723d8bb25d68de74c8f9ad9ad9c7ae81c7d
-
Filesize
1KB
MD5cc2397d14841360b425a17a4b3c3c03f
SHA178e08cd0f9ceb398cb56e8f2620facb5807066ef
SHA25691aab82601f90b5f0527e803dec725479fc52b68dbcade1f28d93ca5201d203b
SHA51211ee8edd5636580eca82202d015a60c0f64dc114490c8c907d048241f00d8d302cf1a6abe70e10db475e42d2c93d0f7d12eaeb4012e76014ca0c90c93a724a6b
-
Filesize
5KB
MD579204bdabe22ad02c2c2c00d8a10fdb1
SHA1442154708ffe1f0a500793b308cfe413cda83386
SHA2566e3d834e1531db2c30fe52670419d0ea3aa9456a117dc6a4c14b9c2ba6977943
SHA5121f6c81eaf0944baf788e1e54629764fc0fd72196abbaee6ac24c3a590b335f7c4886718bde08e0ef1ee452fb4776360ad97102b3c7ef25d89df913a35d809aa0
-
Filesize
7KB
MD511e922965c2b7f660abd4592568f80e8
SHA187687336370f209312945240387d4160cc958165
SHA2565ef38bc430e309055ba295a1f17253e44916aab49910107057c2272e2856c5d9
SHA512811e9bd13446530e4657c9f9b538ce87e3f64f12d4c61e8f1464c39ab1588e37b61da01cdbef4b256f0663535e2af3d708c9f151372e65c9e4d828d3786079cb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD593ed7f37072c6e10b631a67d55142932
SHA173d055d96464b576f030fd17fe3e825afaccddc2
SHA2564bbf8754b8097c4c562b29c5e56828b49e9ed08985c1786d7e8d51596d5a342c
SHA5129e097d04b49f4f96c9bbae8fdd0ed1905483cb2b16bdc75a001d62061ee385cca42969709f0bf4e5ad1e7a7ef2db8e5f572a0cf7288338771c53440fb7660337