Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
a89ca3f04d5a1c9899b989bf0a40315a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a89ca3f04d5a1c9899b989bf0a40315a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a89ca3f04d5a1c9899b989bf0a40315a_JaffaCakes118.html
-
Size
57KB
-
MD5
a89ca3f04d5a1c9899b989bf0a40315a
-
SHA1
55d34ea76d710225c719188a973446f2da4242f0
-
SHA256
48d149e3830a129c55854386dbf23226b947fa1b2d4d0dcc56515342fc343a56
-
SHA512
cd9e2026d4ca9e9460b528387df833791fd91393bc7ca867ca928b6319cb4c98d83f8f8bc032016aaf4a97a7e9840e24386466e65fdbad492f31ae53930b6020
-
SSDEEP
1536:ijEQvK8OPHdygYo2vgyHJv0owbd6zKD6CDK2RVro5EwpDK2RVy:ijnOPHdyC2vgyHJutDK2RVro5EwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 396 msedge.exe 396 msedge.exe 4752 msedge.exe 4752 msedge.exe 4444 identity_helper.exe 4444 identity_helper.exe 5528 msedge.exe 5528 msedge.exe 5528 msedge.exe 5528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4752 wrote to memory of 4188 4752 msedge.exe 84 PID 4752 wrote to memory of 4188 4752 msedge.exe 84 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 1480 4752 msedge.exe 87 PID 4752 wrote to memory of 396 4752 msedge.exe 88 PID 4752 wrote to memory of 396 4752 msedge.exe 88 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89 PID 4752 wrote to memory of 4148 4752 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a89ca3f04d5a1c9899b989bf0a40315a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7d1746f8,0x7fff7d174708,0x7fff7d1747182⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6180 /prefetch:82⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6240 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:5360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,9464876953214671775,13440321750713571884,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5545bad5bdaae83f90369ff0fe23fc9b1
SHA197897545038c4cfc4835065072881c926b83118c
SHA256359e62893c0f7fc1edd684372e876551d5ccd82de8f98ef8b563e62e254efff5
SHA512778c4dd47f3fa57084e3da68a4ccc637213525d83bac74e61e88916cf1ca0737ad4fdf2930b7aa6bd87e4cefac2f016838137f6ab2c85a8cb4405690501c7aae
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD55cc930d8f717bf31f250f431296bc454
SHA1d6ba8043a2ea54915e6cbfaff7830a91f7707f12
SHA25654f0d0a62b70330964ff41189f41c86f6cffb3fd770a75897852da48cdb028ea
SHA5129de488300a790e5c75744df1a49b969e9f69735b9d2ea3181824002be4bcf0cab6d16e245122bd9d770048e90efc57ad471cedf93b8222dafafbae4ecbf7c5c6
-
Filesize
2KB
MD5605dc2f858c2d41296bc839d6588954b
SHA1a4ef27a1485ea20b6923ab0b69574e517ba1f70b
SHA256dcb0f5027327d5ba102c94590e29c4fb956cf669fd8e4f7ecfb97aa839a6841f
SHA512d7718fdac7a61f9fe79154ecdb5f691aa05beb80e3f0fda9603605613bd29795868086ea74a4ced3b2e4a89730782bc3725428f7722b7feed1ef3e4274d97b40
-
Filesize
5KB
MD5ed902b5cc874ec7d2da7b3cb217fedd5
SHA1483e00febea376bfe444bef5c9c5fbfcd6cf04f3
SHA256b55e411d00d27d9b1161cd6484c03270ef88918983239a13a8013847d1272934
SHA512a3147a36e5539faa1c1649857ce422393c4cbe63d2ae753f922422db9518ec98702d24a0f797f5c96bb9bae2f62240fa31926de849a4708b657861e816cd6ea3
-
Filesize
6KB
MD5322c3f2d39031322921a8f87a36697b5
SHA18284ee849aff7b685d11eb5bdf4d8e5729d6a1b8
SHA256adfd7ea6e61e14c5d7b583c7ae317f2d4331f472d0475099f81e03c75baa7459
SHA5123b37e51568a47fe725643d7fc4e6473313fc9d316996486372c74436a84c2b8869d5abd6887c1ea7171b848ccc94f7d7a37f7147c6901dd4caeb7c069fac15e9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD583aca7c3edadb8b2db262d130db6ffe4
SHA129f42e32210dd17377aae03c8eeca00eaa56d9f9
SHA256ec900c3e8d1b6b45f18ebcbc06ccf6923208d6d4aab9527ac09026c9f304c2a7
SHA512547f78b13a881a23087c974d8e48545dbf587eb485e7480cc68fb347c5b0067d79db69aff39320fc7ef740dbb1905d813e8f6aeb38fb94ed6993fea0f7f9c7c2