Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 14:11
Static task
static1
Behavioral task
behavioral1
Sample
aa1b2e83e5c3969b20abce78a2d6f010_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
aa1b2e83e5c3969b20abce78a2d6f010_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
aa1b2e83e5c3969b20abce78a2d6f010_JaffaCakes118.html
-
Size
62KB
-
MD5
aa1b2e83e5c3969b20abce78a2d6f010
-
SHA1
030a2a7413297dd0dcc2e2219faa86d92f4df7af
-
SHA256
acbd4ab10f36fb23ba97fcc1285ac3f54372f3213b4606947f02694753ad5fad
-
SHA512
2b64ae592fd07ee69b79267c85c6b6e7bf68eed7f362c785881176073689dcbb7cd97a6cbf41d16da1c57bbb83fde57511681b5ba2acec011f730ea57ff1ff8e
-
SSDEEP
768:Ahy1StJi8FEwwr3D/2bzc9rA4W8X+NEdi6IWC19NQRp8nvhI/01X2SF2rd:6Ji8FEzYgdA9vNEh8nu01m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 3576 msedge.exe 3576 msedge.exe 1804 identity_helper.exe 1804 identity_helper.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3576 wrote to memory of 1612 3576 msedge.exe 82 PID 3576 wrote to memory of 1612 3576 msedge.exe 82 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 1016 3576 msedge.exe 83 PID 3576 wrote to memory of 4020 3576 msedge.exe 84 PID 3576 wrote to memory of 4020 3576 msedge.exe 84 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85 PID 3576 wrote to memory of 1668 3576 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aa1b2e83e5c3969b20abce78a2d6f010_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc8ad46f8,0x7ffcc8ad4708,0x7ffcc8ad47182⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8187031012045595195,17840948295422489963,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD52ee5edd515f31f95df8c99ed7daa0604
SHA1fc4a4a9bd494ab9ce760e728082b7adaeb9761f1
SHA2566e2af1086a5f61fabf5bfacb13727a2ec2a254477e2d1180b737f9d935993a3f
SHA51212226a710e0d8f9296657de650745d88b25bf57acb1a5f090289890efc0f3ec4ec5da87cfdf8ade644d4fd9b40641a3fb4bf023171eeb8f8c28378996dea6578
-
Filesize
1KB
MD5af76369e023c8aba34ed0d4f5b6e00a2
SHA1ed4edbee8bcfc563a7c22c71d2bc00ec4e83dbc3
SHA2565d6827af182768084d79ef0ad86a598d2e61f89b211ee8429c37ffd984f5aa3e
SHA5121016bb7672985c8f008508bdb08901106b1ec82dd492d0e0cebf5870e2949620f364ceb1c51cf5bedbc40104e8d21ede131acc244be9646c652b9d78e3b019bd
-
Filesize
6KB
MD5a92c3653fde1179b78b8b5bb77158f0e
SHA17105c8db33871ca57a079df7c11f633e8de9bbaa
SHA256ce90167c810b99f480c49f6925590c0f0996bae3f7d8847ef3f0dbc483275c13
SHA5123ba9fd5937e2f3247cdd04ca7ca71ce7dd2dad71dcb11b5b868ff620ca8988d6fe12332878e6f63ad646a90b22ea39929c6aa0c9ad8690273ca4885c0604f488
-
Filesize
7KB
MD5d2866ef4b5228a5c3be60e5ef4f33c17
SHA164f9d2f5b3796a63fe86c86e623923fc43e182d6
SHA256d79a92ae2f201cb35bb66a3f2294de369547a9204a2f93f88550a156315c7a78
SHA5125209b034beffba43817399bc69e3e9921bbddc7fdfb71070544756f01c1e876c8e8b409970452fab9ddd42db2dc3e21d5296590bb443f6a3cf48ef3a989cf10f
-
Filesize
7KB
MD5a43e325031a429cca10a7d0fa93c6700
SHA1a96699893d0bee0a3ef363c2cbdf967e9599ca97
SHA256eb5856f421098cea30856c8d835c914d6bda537ccafe6393c5744713373a18ba
SHA51229098d1670901fcaee2020bb181a08039643fbcbc4f20fe8cf29367b1bd08d14bf4eeb3f409521d485369b17386abbe7f734872a0c1c16f309b8141a10823ff1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57a73e36aba18d7242ab1ce1323833f20
SHA120b187553d6a8236c00140285f4d7e4449bc243d
SHA2568cd08ee9bb9385febed6140e15fb2583bd1cfed2c2606da5ad7147344dc90df0
SHA512ca81afdbcb77f316c0602df7aedbb2c4db6b50556fbeeaf9d874d39131f7c95c2051c8466d42a3c4432ec1a6c35f90121e6cd3b0c15b9b1b6e06110881da04ab