Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 16:13
Static task
static1
Behavioral task
behavioral1
Sample
b4242ed34657f8dc202be52ae3355816_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b4242ed34657f8dc202be52ae3355816_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b4242ed34657f8dc202be52ae3355816_JaffaCakes118.html
-
Size
57KB
-
MD5
b4242ed34657f8dc202be52ae3355816
-
SHA1
f0b9611ef25c7de177965225d122195f0f323ba2
-
SHA256
d4dc29f63b8c6054030b615b598bc52c950958b29b3740de73525c365db262d9
-
SHA512
1067775f0e39987df34d9253e38272cad0b1e4babff5171783e7ad7e959730bd9eb23bcad21ebf0fffdee5e17f67bad698cc5dcb6b86fcaedbcf561cfe870275
-
SSDEEP
1536:ijEQvK8OPHdsgjo2vgyHJv0owbd6zKD6CDK2RVroLlrwpDK2RVy:ijnOPHdsD2vgyHJutDK2RVroLxwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2152 msedge.exe 2152 msedge.exe 2348 msedge.exe 2348 msedge.exe 1712 identity_helper.exe 1712 identity_helper.exe 5460 msedge.exe 5460 msedge.exe 5460 msedge.exe 5460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 4848 2348 msedge.exe 84 PID 2348 wrote to memory of 4848 2348 msedge.exe 84 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 4708 2348 msedge.exe 85 PID 2348 wrote to memory of 2152 2348 msedge.exe 86 PID 2348 wrote to memory of 2152 2348 msedge.exe 86 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87 PID 2348 wrote to memory of 1040 2348 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b4242ed34657f8dc202be52ae3355816_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb96746f8,0x7ffcb9674708,0x7ffcb96747182⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:82⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6584 /prefetch:12⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6560 /prefetch:12⤵PID:5512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,9365714776465055960,2521410232364900208,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD54e68b5628d203a2e150b0fdf2d608b86
SHA198f5c8922199f97dcc8f564f4f74e0a8de2283cc
SHA25628a88f4a7cd857f5328df35507fc3af1c512a1e353a0b381a98d32f27ae57166
SHA5128c2b358f9eba6be57a47d455d820f83a68497a07c9acf0fd39898281989fbfc31be0d4a43c1552b4cac266f57e5d26b6e09173a0e736205c9b65b1794f03b1d2
-
Filesize
2KB
MD5e23e90f1bfc30bb2e3fc6aaf955d0800
SHA15cede25bf845a5510f14074da35d9cf464815c25
SHA256ce825580d05293e7a26c71d1c5aab353539594066f4c5c5f676da99c0ba1d091
SHA512a67a89ee9a2e738ab2652fbd531b1eb0fd21dfa647494a89d5459bc80bee66a010d5e38f9a4fca30b7ae23225adf6e5015a1293b35fc6a648a4bcda402d504a6
-
Filesize
5KB
MD55e48d2b96c20486d89a6b6512c86f21b
SHA1a232c7773e9d779074f0ab1737826dfa48dcfa01
SHA2566e251880b82feecbbe9a5bfa16f67685f2be70c5faa2d640199d619240f78ecf
SHA512896fa26f4d2a8f75693ef26c0d58942ff128c45fdb06a5eee15347c77cb217471abb4ac5560f8085d1d117b035f3cc2a5b7dce86f23db315e13a1b820f59e1e2
-
Filesize
6KB
MD5ac256a271612d01b13a9e6c556d4c00c
SHA1ed296a002614cd5ae3ab0605ba28011302a0c53e
SHA2562a15ad291c270c97e0fe22798d38816c33e6f516806ff57df440238b2bf634a9
SHA5120a8ca1d587c029a018f8421e935374886803077a8a7d3da1e1053e50096015c3318529b2fc91d22efd93e9e27ccb921b08e74fae1959ea9245ce2365fb5e5cf0
-
Filesize
7KB
MD543aed87d4f21e07489fc33bd8af50d3a
SHA15e09c67c6df573fc047d0caaa7a6ee49efffdde0
SHA2567ae2bd561dbb08a9027758b8d920fd9ea545323398a9aae6a5e04079693242c7
SHA512e19f8d46c493c099e3b27ee6407afd0944f71dd94bd92f983e510a32be14fd48fe3d55aa081a67c93e69e0c61dea65a255b9813aee12bef7006f1c4baf559049
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56886be4bdbe477a14bd235689531b053
SHA12dcd11b5c04b967b72cbbf2c5c8606228277ccfc
SHA2567c7e31e4e57a1e7e695f3dd19d64ff20ff595553e34ea6cadff32e759ea6ed04
SHA5123baeb9cd5b03e856ac9c373ec996b272a25bdd49ef57741c89f4f53dfb504978f30867a1e4c9427162190241e9405eb128821f552e2949fbefa19ec7ab38d9ea