Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 13:21
Static task
static1
Behavioral task
behavioral1
Sample
91ef33a863db0d1185074dadb90a492b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
91ef33a863db0d1185074dadb90a492b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
91ef33a863db0d1185074dadb90a492b_JaffaCakes118.html
-
Size
48KB
-
MD5
91ef33a863db0d1185074dadb90a492b
-
SHA1
f39acbd1e01cdb4219dcadd685c14aa16ccad85e
-
SHA256
cd24ce8c0e9c3363df971866e3b9823565b8869238d41874af5fc8f0d5a6cfac
-
SHA512
a56e302bdf61513ad3cfd45cd87c17be71e1a342ca74177a3ce1c45ac70bcc1e5e87b959dd5a6183c106a8918b9c0ed0c071a8596dc58de5c8643056c4fae1a4
-
SSDEEP
768:DsC3mQXNrS+KdQYp98OIw8snpHWIj3RVXE1T2vIeoCq:DsNdQYpyOIeTE1HB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 1624 msedge.exe 1624 msedge.exe 552 identity_helper.exe 552 identity_helper.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1624 wrote to memory of 3088 1624 msedge.exe 82 PID 1624 wrote to memory of 3088 1624 msedge.exe 82 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 4348 1624 msedge.exe 83 PID 1624 wrote to memory of 3724 1624 msedge.exe 84 PID 1624 wrote to memory of 3724 1624 msedge.exe 84 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85 PID 1624 wrote to memory of 3308 1624 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\91ef33a863db0d1185074dadb90a492b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8a2246f8,0x7ffe8a224708,0x7ffe8a2247182⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2664 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1308 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6640 /prefetch:82⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7325170396180885944,8094893665231353597,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD56e5a34a26dea7ba7a4d6acc7249354a6
SHA1f1ca50eccf512a057b0b80e55257d4d3951637e3
SHA256aeb93710cd5d175a19046b2c50777534e2f1b869b2456c3cb721387f966abbd0
SHA512a901e655fbbadb9697fb96fb07883c6e1ff2d581b34e78d68e10303b0e56cd9a47dec281674b772b0d7714e3e6ba23590492a51dde9554198bf86eaf2bab4867
-
Filesize
3KB
MD554d26e8dc4e203d607bca137cf78ebc1
SHA1bf98e85cc2f4119b8a5bc55203882f547903b3c6
SHA256c36436bbf5ee3723d651853b973e36c9f32f382058a8d6c94e510010673a5de0
SHA51237da2852a901e77c5196fa276548ee8fe891076769f636b9794c6042d2f88d3153af6a08562ab243c6ca7384f5ba457e97003782efae8a33255c85ceaee1dc21
-
Filesize
3KB
MD5e85215e0d125093d821de331a7e0a88a
SHA1d7eb2e248eeb8779d8db4c283b9e9de903526056
SHA256719deb1893a0592cc80ccd054cb8865206c221887a5e5b129f60f7484cedb474
SHA5128be1e12f47bed5d3abafc5952f535d7a2c80035124f8f4fe37bd0c0e7588b83c25cdd840ca27dcd478e421ba615afcb48af5c7edbdd79072dcba7513f7a29b97
-
Filesize
5KB
MD5318db15bb702be400f78cdd024a0ded7
SHA1efe2e8630088870e45e3cf095175042a1f2e071f
SHA256884076a01b8cce30bb8490658f43e0e3db6465f3887c3deb370a12a99aec4dc3
SHA512c84fde50248fe4241613f4c99fc9fffcc69c484e5c5c1aad110e5ad9dcc9506993554854654bd2655a183585720b890dde5fe96f0b190d6ed44b4150c85bb916
-
Filesize
7KB
MD57bfde3e12ee9e695f63e5f0b03c63b42
SHA14969019c820cda1a85e78c47a911914d0f498707
SHA2568d5fa8a419f66e6c7ace8a99edddc73dc6b28859a5ee06c6333f1f6dd36b29ba
SHA5129c6833b8b055c8a9568e0bb868f737aeee03dcd489164603624594b0a626b257aaced8d090718dc60c2825beb220afb4b2ead5df67903df4c2f860bfd43d48fe
-
Filesize
7KB
MD546daaa98dcd0af20b163670a1dde7fec
SHA100b285bf1a575078006b33d0116d07648b7aa44e
SHA2563ab67b74d54e701ca98a17c41519fac5522c5c05da408aaaa09fddec2cc02428
SHA51273f629171fffd4644307ca737e28808d6632377d6bf653d521bf3f6a51cf8a3ee22c82827813cb52f4910108b15488156359883522b780730bdf79550ac6bbc9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50b0af864c2099673c8622bee7c3d8aad
SHA106fdb8362a9948c4c6a9d493012ac99e70150a19
SHA25679b07c051e1934a228d420dc745b82fab779137cee0c3604e64dcb7f85bfd514
SHA512bb36a23844c2e67c615c629ee1d010a83fcc51e501fee765240b0bbcc3c956352f9d5b9c5e75fe4bd87ed7b31009ddd5b7b09778d3410cdf981103f530f50c99