Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 11:08
Static task
static1
Behavioral task
behavioral1
Sample
9df864afc3e0dab578bff2b932b3f280_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9df864afc3e0dab578bff2b932b3f280_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9df864afc3e0dab578bff2b932b3f280_JaffaCakes118.html
-
Size
79KB
-
MD5
9df864afc3e0dab578bff2b932b3f280
-
SHA1
17f0ff35353fbbab09512f97bc83fff82b45313e
-
SHA256
26e9e08a35d34fdd298fcdf0f9878d80f6f0e52b26a939d071668cd154269c43
-
SHA512
22fd1d7640cc2a8eb1aef70d591758198e12b67ac98c45523361c872c15b0661f99d468e95cd0790c33c8ee2117d0bb75ba2b5c9d1cb40a1331562bbea33235e
-
SSDEEP
1536:NnFlElSsV2DVTbUnzw14qVUDDkf0Hrb0o+7FVPBP9LryHDtYYNndo:NnFqSsIDVPozwaHMo+7JZsKUndo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 1732 msedge.exe 1732 msedge.exe 2520 identity_helper.exe 2520 identity_helper.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 4840 1732 msedge.exe 81 PID 1732 wrote to memory of 4840 1732 msedge.exe 81 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3232 1732 msedge.exe 82 PID 1732 wrote to memory of 3776 1732 msedge.exe 83 PID 1732 wrote to memory of 3776 1732 msedge.exe 83 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84 PID 1732 wrote to memory of 4000 1732 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9df864afc3e0dab578bff2b932b3f280_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe730346f8,0x7ffe73034708,0x7ffe730347182⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3648 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6196 /prefetch:82⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5483043133782271130,1066123534364037065,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
44KB
MD523536ccfe05b737ae639fe63ee4cc435
SHA16d2e9822835dc3e6117a4d2addfc8f241fbdbc82
SHA2566ae9edfc411ede03661a3d910fafddab3d6b313d1f4668dc8c5a84c5ab23a3ce
SHA512f416e36b2322bbebd211fd1ea69c88883f00c7b00f14474a5fcce4a408840c0d1b0304eb8941509a38157d0583485f638959eb7d5b9ae668aa88c1d3eee8dd0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD527b4e5225d26e97d050343d07d002c4a
SHA11073380a54d4aaea159bf6edd46c680c70f215f6
SHA256f7b0f732cda12aa91467c63c6e06e761845ccf17049e66fb6ad3cceb6253625d
SHA512f67691d17a7fa99c84c284f32c907df635e3d4e208f875809f7671daf219c5bbfa4bfa95360d3e39d7cc9d4c38f9561e909e9d9f4d0c4376a7c4ea8764fb77b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD58d118c65bd0601fd764a978a9de46cf4
SHA16d8315f7471a26982473b3950d85e97942c9a80d
SHA256acad025dbe5b34977e64992fa1eca92db502999bdd09909b80b527b7ecced943
SHA5127ca6f17d28cbd9d3e88beed910e6f721d9c72f880700ea89de1ce81fbbd446eaa4b8b3ce09ab7087c1d4e1391a30e02f1a60f8a051413333d0629644e8c2dcde
-
Filesize
2KB
MD5c58b54d050f3f4e39fd99d154f2a53b5
SHA1b760043ea7a41ecb4c2d1c288bf0dcea0b6facc9
SHA256f8282dde41229df372a08863623fe51b62ebdf64b5426285049e8a24dacfcfc6
SHA51221756a56a0e2db811e4dacec84bec812c6ea0e5645ed1748a14dd84c67228d86669123448bb80f0b4aee7f482f697cebbd23365ce0af2b86ea4c09d2a9e68300
-
Filesize
5KB
MD530cb6e1147d8d3e1562c60ce7d984a3c
SHA11c7b1775a8ac9de136e6c2cab8eba7454bde1d25
SHA256b6bb084dd52257a5cde7cbf3f3b8594c062db46d338b62d2531c8f712679106e
SHA512d86fdd1c6fb06f53e811cd4a1ebb81d088544f75852e933e244975273ce2fa291aab9c30a2537b5d370f510b57ca611865a16d26d24f1494f9dfcafd762af933
-
Filesize
7KB
MD5934ac241b42bf2148ee81eff0714c9c8
SHA1d1bd4e88768663bb7780b6c448ac63bb059b8d85
SHA25680d64446f55df2e48ffbc49884b8f9eb8dce9deb811730f7d8c047fca5213254
SHA512aa4bddcee8f8271e9cda67da11a25fd0a4783ef9dcd986504aa71485f074a68b2a3e8acf9ec2b01d4d6a5f576678440313354ba9799025c9e9af80ffe7275499
-
Filesize
7KB
MD54b45a758db75f0cf96cc4522ddb7c146
SHA19da99b62cda0aa854386f5632c347db1ceae11cf
SHA2561f833b437b47d01aca8a29d663f787461a0b0ade8ead86beb5e274fb92f2e7f8
SHA5121f945685737a34114f998c3e5944c2a8603159089711c902ad32459581626888b55833039e6f7ea9f79740f92553a02f6db5a79da89e30176616cef47b2375b2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57dfd01c093eabdd00447882e45f894c6
SHA1d901fa6621dbb19f467d798862ee7557d7765aa0
SHA256ea34e04605b9000f35799736d394b3667cee245001defab82c29e84e3eb1c374
SHA5120b1ada92394ee483c504e5f16a65a27492bd45ffd1eb2fcd9579ce5f22cacc2ce1317f6708a8f5af6f9945ce04596cbbb7d439a9e052171cbb0d1ccebe7dc873