Overview
overview
3Static
static
34c4dbfa3e8...18.exe
windows7-x64
34c4dbfa3e8...18.exe
windows10-2004-x64
3$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3GDIPLUS.dll
windows7-x64
3GDIPLUS.dll
windows10-2004-x64
3MFC71.dll
windows7-x64
1MFC71.dll
windows10-2004-x64
1PGL.dll
windows7-x64
3PGL.dll
windows10-2004-x64
3Usermode.exe
windows7-x64
1Usermode.exe
windows10-2004-x64
1advapi32.dll
windows7-x64
1advapi32.dll
windows10-2004-x64
1dbghelp.dll
windows7-x64
1dbghelp.dll
windows10-2004-x64
1doc/ChangeLog.html
windows7-x64
1doc/ChangeLog.html
windows10-2004-x64
1doc/Interf...w.html
windows7-x64
1doc/Interf...w.html
windows10-2004-x64
1doc/Interf...w.html
windows7-x64
1doc/Interf...w.html
windows10-2004-x64
1doc/Interf...w.html
windows7-x64
1doc/Interf...w.html
windows10-2004-x64
1doc/Interf...w.html
windows7-x64
1doc/Interf...w.html
windows10-2004-x64
1doc/Interf...w.html
windows7-x64
1doc/Interf...w.html
windows10-2004-x64
1doc/Interf...w.html
windows7-x64
1doc/Interf...w.html
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
4c4dbfa3e810daed24fb1d2c13db904c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c4dbfa3e810daed24fb1d2c13db904c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
GDIPLUS.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
GDIPLUS.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
MFC71.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
MFC71.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
PGL.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
PGL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Usermode.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Usermode.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
advapi32.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
advapi32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
dbghelp.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
dbghelp.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
doc/ChangeLog.html
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
doc/ChangeLog.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
doc/InterfaceAboutWindow.html
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
doc/InterfaceAboutWindow.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
doc/InterfaceColumnSeletionWindow.html
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
doc/InterfaceColumnSeletionWindow.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
doc/InterfaceDeviceInformationWindow.html
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
doc/InterfaceDeviceInformationWindow.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
doc/InterfaceFilterWindow.html
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
doc/InterfaceFilterWindow.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
doc/InterfaceGPSTesterWindow.html
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
doc/InterfaceGPSTesterWindow.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
doc/InterfaceMainWindow.html
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
doc/InterfaceMainWindow.html
Resource
win10v2004-20240709-en
General
-
Target
doc/InterfaceDeviceInformationWindow.html
-
Size
7KB
-
MD5
447fbf3422c78d56d3af97f507036c71
-
SHA1
4563d496a36845d2588d0f8eebefd5738c7ef48a
-
SHA256
7849562cdbfad4b57c65480d8c40856a881c94752a481c38d9948920773261b7
-
SHA512
c1678359e95d1c64709c4d91d3f0b69e0863d3c568797f3064b00b421508745b9800a3f54e9752138bd6fb119b3a0e862f84d2e36a47fac96629f01d7e6604e4
-
SSDEEP
192:ScQyHeiCuhMq33+HRDk/wKmg16pt+sx6FEu36F+UmZv0OA8D6KSWkUzyhww8gntO:SQeiCuhMq33+xwoKmgwt+sg8+UEvvFS8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 1704 msedge.exe 1704 msedge.exe 652 identity_helper.exe 652 identity_helper.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1960 1704 msedge.exe 85 PID 1704 wrote to memory of 1960 1704 msedge.exe 85 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 4832 1704 msedge.exe 87 PID 1704 wrote to memory of 2040 1704 msedge.exe 88 PID 1704 wrote to memory of 2040 1704 msedge.exe 88 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89 PID 1704 wrote to memory of 4756 1704 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\doc\InterfaceDeviceInformationWindow.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6e4a46f8,0x7ffe6e4a4708,0x7ffe6e4a47182⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,12404654187157719108,6530884112930226729,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,12404654187157719108,6530884112930226729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,12404654187157719108,6530884112930226729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12404654187157719108,6530884112930226729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12404654187157719108,6530884112930226729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,12404654187157719108,6530884112930226729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,12404654187157719108,6530884112930226729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12404654187157719108,6530884112930226729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12404654187157719108,6530884112930226729,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12404654187157719108,6530884112930226729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12404654187157719108,6530884112930226729,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,12404654187157719108,6530884112930226729,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
6KB
MD57bc25d1c965c54074637965534b6fede
SHA1e0dbff0508915b0f6381d73b2b0980ed8372e41f
SHA256208db968ba2527b9c3a798ae7ccd0726e8aaae543524cbcafb6a41b7a6bfe437
SHA51247566090a1f4ee5fa4c95a6a05c32827f3d9493fd941e08a70df6ea4e7eae6b4220651004ba2fb81baed7a149045766b69092e0c83d897ee4ae40f6a305f9f3d
-
Filesize
6KB
MD573f8feddd6d6fcdd104d1fb6658fe484
SHA190acff651dbfde32c17703ae13a268ac942c45dd
SHA256a7faeb8bf7a1052d386c60c104cfe6bde50ec1c01b423cdf072023db5680e833
SHA5125d6453f94e58da55cd4900d9ad2fb0f5d6791eac09855a2439fc8cb1ebd3b6c0ce9d1cf05333ec897363e11b8deb0e43bdb602293e19a070f101f151b80b8f64
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58d35fd8a21b3da71ff36f423f832a024
SHA141f60ca681814ba3cb07f3fbb08df38c67074c18
SHA25619277f37ca5631e4282eb63df41f94cd4184cb6210d5ca48961edef23833a001
SHA512032edddac5b3476ae839f3e11ad0ed821c5d0f2a141960e23b8145db9fe7efc6405ed3ef52416c0a397410d5d59f389a0ed6e9c1ca2669812d3e038b4034aedc