Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
9130c4d75f9036b16be8979046bf0aaf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9130c4d75f9036b16be8979046bf0aaf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9130c4d75f9036b16be8979046bf0aaf_JaffaCakes118.html
-
Size
175KB
-
MD5
9130c4d75f9036b16be8979046bf0aaf
-
SHA1
2b5786d0c2739102463c1e7746283186798aff16
-
SHA256
198c50b0612ed0f48164f6245bc3a36e76c5aadecc58d397677955b22641763e
-
SHA512
724b1aa95a5447f65c26f82f1c1880e6edaad80a58029fe82a90682d27e92e0a393fcafa56d0f59c8894750cbf572ede88c1bd0d6fb733c7c226783bf2852710
-
SSDEEP
1536:SqtO8gd8Wu8pI8Cd8hd8dQgbH//WoS38GNkFiYfBCJiZP+aeTH+WK/Lf1/hpnVSV:SaCT38/FzBCJi2B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3612 msedge.exe 3612 msedge.exe 536 identity_helper.exe 536 identity_helper.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3612 wrote to memory of 3080 3612 msedge.exe 82 PID 3612 wrote to memory of 3080 3612 msedge.exe 82 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 1492 3612 msedge.exe 83 PID 3612 wrote to memory of 3540 3612 msedge.exe 84 PID 3612 wrote to memory of 3540 3612 msedge.exe 84 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85 PID 3612 wrote to memory of 1676 3612 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9130c4d75f9036b16be8979046bf0aaf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9903a46f8,0x7ff9903a4708,0x7ff9903a47182⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,9501444908015350182,875460277030607153,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5568 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
19KB
MD50f0c9989cbb18447d2f5d954c20ed99f
SHA19ad0fd560c0c478c67cc8f118e363b3a1d1cdb5a
SHA256a43a9e5bbd2d8a8aed070df3b2c799afe064312d6f248c4a498a67c0f9a02720
SHA512ad6a2c60d3e5aab48497169e380d0fa50d7a0fd2bfa0a07313d880afaafd2ff2be7521864ab7ec661866b1ee4309467ef2733a24dba7e0facde8d190739d9fa3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5d32d9998d09e15bdc30a22419bd3c6ad
SHA1b73a644e9f09a32f8344c2cdc2b26cb572bc7e57
SHA25660760a140c215a48c4ac3afdbb563336503038cff56f35cf2b44dd1d346556a9
SHA51214ce1e2fdb44c644e1cec9cdd6d2266a359436fd1dc7bd7586f5f2a4ff90204dd3d844981758c5d1d281f7ea523122a5f907480e158446504e9acb67b643cdb5
-
Filesize
2KB
MD5e40d69df418961ff82c6f7daf9f7b00a
SHA12cf9837b771804455c3f142bc72b2ff0a74f9090
SHA256de37e3a0e2bed86c6f4d2491860f558fcaf573f1867034879f372d5bc1061c14
SHA51242a51f44e3e7cce5cff601cae76fcecf2a258d091114435f40972060cbcb9bb9dbb87d7034af687af40d95c27a98c3939bb3b4345de5991446077f71478a0090
-
Filesize
2KB
MD5708eb0054c0d8d44689a0e5af479ca6b
SHA191ad49a4c21e05b1e8d9593bbba26d4e3e135fc1
SHA25634b7235ca61283db869464b82c01ef95c178f215cecd063b139ea2d66bd33609
SHA5127044798b38cd99c6ef0a26aee20ed53b4885d435a929231c2a6203d4239b410b3a7f9ad688dfc0abbe2c56aa8c8c2e7f61f4033c00dea849cbba45ca26526c46
-
Filesize
5KB
MD5bcb5c137c54b70f28db5880d71229208
SHA172297b77773555f12f6fc3451afe23329fe64105
SHA256ad60d6e209b27bab064ae5b51ecd320e054835e524df9dee2bcb2de842fe199c
SHA51281dc1a2294623d0828e9c27c9b5fc119269ad8fc7d3acd5275bf5f5f03dca63157c8770422d04e6a3c3cb29a646d19cb3f67283e94d5921e18a0612d8c174362
-
Filesize
7KB
MD573bba232bb148c0c14c3ae5a46356d98
SHA138342369aeac2ea691af46840a47e5db435c25d3
SHA256dd3b073369f1bcbb4e91f018445fda7497eaddf0d34955ce25055173891989d9
SHA51272f225a632e43dc58f3c6583c379eacd1a056af7e184d8a8d074da0ce64636dd4fbe74166ef1e8deef88e9fc98960fcd1f531e9eb71571d035bf9412c5a8fa90
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5816e759cb3aa613bd03019694e671a76
SHA1d1c2a9a7000806f0aa73e6daef0aeb172fc566f7
SHA256759e981faf77e94697339be8d7c914a7dfb09b33f5ad2db39a01d8c10871689f
SHA512533fb895e714ee2e77aad298b8670fc5147e3f0da881617a87e8aaca23e630aef2dc57e8cf41e1322e477c83afbf510ac0cb27e94a711b7adff7971bf491a36b