Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
b0b0bddacb79254a2de91f8ea0809b3f_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b0b0bddacb79254a2de91f8ea0809b3f_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b0b0bddacb79254a2de91f8ea0809b3f_JaffaCakes118.html
-
Size
115KB
-
MD5
b0b0bddacb79254a2de91f8ea0809b3f
-
SHA1
764db6aa2088e5c33016c8e596fdd29f66c3239e
-
SHA256
0bed2a1eb9f042c5358e2989b276c6731f9d444e5c9ca31cdb4529c44762a2e1
-
SHA512
8c0c7b9e3eb100fa8744614c17e31274d9c72458d1345cc31f6362771cde055fb5ef71f6a055414c0ac97ad18294132a480a3e6cb9813feddaf51e9e181a709b
-
SSDEEP
768:XKL3xskMXfnA3gnoWgGjmD4ODC06azBh8O2edwyE+oepHfnfkqdLO9THojgWOUFE:XdxXf+gnvNmD4ODN38O2Wo+/fwH+f5Rm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 3240 msedge.exe 3240 msedge.exe 3820 identity_helper.exe 3820 identity_helper.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3240 wrote to memory of 1672 3240 msedge.exe 82 PID 3240 wrote to memory of 1672 3240 msedge.exe 82 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2108 3240 msedge.exe 83 PID 3240 wrote to memory of 2608 3240 msedge.exe 84 PID 3240 wrote to memory of 2608 3240 msedge.exe 84 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85 PID 3240 wrote to memory of 3968 3240 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b0b0bddacb79254a2de91f8ea0809b3f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0d7546f8,0x7ffc0d754708,0x7ffc0d7547182⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7068 /prefetch:82⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,618949739039555552,10456713368437807849,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5b19207ad44f7620d17199bc2c8e4e243
SHA11d7a099c25551bfbaa0d737b79ccfc3f91ff272d
SHA256edc8430c4bada6e1479494de86d25b8dc3ca495b37d8b0dbec61fd44f6d3400b
SHA512fa761dd8d469f05744e3130ff6280b7a6a5e3b62d4495f18c6e799954ab7a8dde6f30b1fa63f90d3d9f425b4f8b42858913848acfa9140505418d67500c38039
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD51d2b46788f775301441e35a90d0fc34e
SHA17794c9af2224ca76c15b83bcba444ac0f049591d
SHA2563b08352bac8344ab6a9a3c9c19f573ef3480f66d56f29deb92548601e63d1c5a
SHA512d96e04de4a223281a2033ea4d8a8bcf52c05443652e04688a837a37402c6f07823903a3e0a97355152773b832c44ac019d22cb813e650aa61abc428c8e796112
-
Filesize
1KB
MD515c15d6faf282242c7f2ee12755d8840
SHA1f27df119a7e14f46806fe3ad04ecf26fab58e94c
SHA2560ad107821caac177c3efa2beb6d80e80229f883477162dc88ba91a5f940fe42f
SHA5129ae23de04cc807b7aea1925fe4f03e247f6c755ff74b74e7f15a0ebe6be538b1133d69190c7586662127d3ef12c4ebc389feb99c2fe155868370cea844074dd5
-
Filesize
7KB
MD5d41ce64bd89b96f0cac596a20ebd71c3
SHA13c07683dd6e262dc3cc7dbe095f280725e2567b2
SHA2563f13920d45939f42ab4c7838d1df70d5ba8c53a487ecb718eacb7453ad5922f5
SHA5120284459cdbd0413f391f20beb2300187a2a56dd19955880628acaa8623cab78f546cd8606f74c1c7dbd34270505c40c4d6dba993ea78865d8d26a934889aa609
-
Filesize
6KB
MD599178520e262a5e78a5be6ac027f3dfb
SHA1db892b9882ab069cd8f6b02703ce520dab571fd2
SHA256881de3c09632f341067d057f359514f9ca5823e7dbf4efc4aa5a06d56c48078f
SHA512cac856d9042cd38e486b32eb1d9276d7a54301a9ca393da507fa8ee4c1be4629e461570f82658fe6fd35d37522c8610b2fc82acac3f1ba1cbaf88f1eb6eee9ca
-
Filesize
7KB
MD51afd5befeab29e3d10b08f67f4f6503a
SHA1dd4067e5160d3c8b5ec60b6b3e04b32038f87235
SHA256f3a9cb1a599f30f7589a35e0ef0b300da31bd3816213e1fff2ee4a16f84c6e49
SHA512b3190fa3b9c49e8d45aab5d692b201dbd31cdfa6c7d36d4f27c3481cb02d938837e9c5e22c0d90f2c01a615338baef4c05a836ab05031e8882513847923cf017
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d6e12f91-bac7-4352-b964-0195edc25e27.tmp
Filesize7KB
MD53bdb55c1b2269fdcbaa945c8e273d519
SHA12e4c8c4d9f81b8435af5967c5b241add0852a3e9
SHA2562cfae954104d1f85b997e335e26ef11810efa42806ebef690dfcc7cddab7826a
SHA5126cf3db388a770816cb8f929c234dcf604939ee889b4ee04820c6dac8c4d1ea13793c2845e7363214c8e882bde152d5fcecee561a0a74049249d041f8418b08ed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d61976bd08bf8bc919e06c7e25a62cc8
SHA17323fb0d2c35f639fa8befcbadce47ee031c3f8e
SHA256082d1f9125a61746dab40616b6b371a77be0aee358637fb8f4c8aaa2510872e8
SHA512c52092844818328dc9df57193b04c96efabef2c30b724aef16dd9747948d000646c07f1f1cbea7b685736f8c407ec2dda7e2282d485d1299e7e82ee699f98e0f