Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
b4f9d4d15ac19100eb979628491a9a51_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b4f9d4d15ac19100eb979628491a9a51_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b4f9d4d15ac19100eb979628491a9a51_JaffaCakes118.html
-
Size
57KB
-
MD5
b4f9d4d15ac19100eb979628491a9a51
-
SHA1
7f9ace1054bfbcbecfe5bec00e9abbc4e6df49c3
-
SHA256
d819932ed0f1c53aa663d9119f3af2dcdab5d84e0f458c3c526d5384cd970fdb
-
SHA512
f41ff6812da5d381e39740612f53fe62a5523b5ccf13a742777e757978a1d85f95a834b8346dae6be0ac914e93757d4a2a5d081835631d8402520e53448ac60e
-
SSDEEP
1536:ijEQvK8OPHdsAlo2vgyHJv0owbd6zKD6CDK2RVro5lwpDK2RVy:ijnOPHdsh2vgyHJutDK2RVro5lwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 436 msedge.exe 436 msedge.exe 2392 msedge.exe 2392 msedge.exe 1824 identity_helper.exe 1824 identity_helper.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1392 2392 msedge.exe 87 PID 2392 wrote to memory of 1392 2392 msedge.exe 87 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 4016 2392 msedge.exe 88 PID 2392 wrote to memory of 436 2392 msedge.exe 89 PID 2392 wrote to memory of 436 2392 msedge.exe 89 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90 PID 2392 wrote to memory of 4684 2392 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b4f9d4d15ac19100eb979628491a9a51_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe5ba46f8,0x7ffbe5ba4708,0x7ffbe5ba47182⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6392 /prefetch:82⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,10938198753940796057,5275637385518432227,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5709c6f4a32b317f6487b598788b6353d
SHA150f44d43be9630018f0bd2acb1528df07cd05b7f
SHA256353aff71e8cf078c88c836e66d86be266ddbe36496a597b9b5a5a87d21eae83b
SHA5124f33792eb73a792c88e8e2dc8bef7b00a2af7b1b91f4bab0cd5076dd2cb9abbb752eb7e60a4c6204d15f9bca1562915f2468b94e5f01f79279e1e7469055f0a3
-
Filesize
152B
MD59ebc024cdb324eb41f33c6ec63d1458d
SHA1f623e96981ee63c1b6879f682c4364fd5c2265e5
SHA25623b9bd7316816043f42a80784e7f247f3afebd3dbe370fbc702189a6a0dddb1f
SHA5126971b6430bc01a36c48bc1e41cf8c4bed65a2890837f7778a896072159940ae739d11834176cc7be6cf6fa0f2ea9e6764c30cd23beadcc88c390e5573bbad097
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD593b60f4be7c15cfeef888b901f0cbb5a
SHA16b9b9e65e0e76403ec164f5965607c0ddf1835c4
SHA256b685557df626eb321b769b90b486c1de7951e54249bffed9351f9213a410ebf0
SHA512ad5aed63c26d0d4120a74de63a4c94308ab99262aaf747505dbf2f20c421c3456da2962805215c2576360953c013ce084064ea47f5d67c27b268e5b06f141622
-
Filesize
2KB
MD56354d1f35c2da4e7f005dc4bbe389356
SHA1bcac34fc0319205a786b935e398014121ed1bd9a
SHA256cba4280769bdd03af954d9574b4b90a546b004e4abab76be770a9147446c294b
SHA51269cfcd3fb4f860d150ac18f305f634171de7eee398c3db3d5a277ca0b2076ff5c0aea7454f064d9e8094f2ac7fb8a4dd6319292e5bba6cbf45c74a7ec9adc0cb
-
Filesize
5KB
MD56414a32b686b4c4c00ccf72f9b3c55e6
SHA1b56c1d8a72c488db98107b300aab9f4aa5234b55
SHA256564029dda20c173ec1a9a9e16877267f47aafafdbdb6279c745d368d85a0207f
SHA5126f2e14608b1bd5cd651733fd17c37ab17e738ed922207556a362a67347e599978bd7b23c428a5a923e1111ea1c7be017a2764bc19809b41566973e208f6ad8e2
-
Filesize
6KB
MD51c19085bb37eda0c0d7d900713f43ad2
SHA1cc803ac7f664ea9b985bbccdab8055a4822b270e
SHA256b94498e5d2bf09b3f4197fff9d6ef1ec5e66e1a8d7f73e6be71b09b7225f94eb
SHA512b9a37a74dcd4774ef4f4251a6f69843b6944e3de478ffd33351c97718cc047ea19c0912bc750cec117aef0489c7bca5ef78e4d054a4dad46faf116f0ea25f082
-
Filesize
24KB
MD5494a861dfe3fb61b7f6e9a8e1f92d179
SHA1903db9c91a888cdd2a359e921ea2c1a958228aa9
SHA25646ffd9cec0b1524402f64218ea9584cb751cd61e56eae54ac0ad61c55273c690
SHA512f97bfb87546ee38f100ef52f6ee6d102d05feb378a940954a1953f5dc301e6ae7a91de2b2176dcac165a61abf867e06e3e31572a378b1abd9ea2768de76e7175
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b2c4e8901a297cffc35a3838f01b1164
SHA16fb91852a0608924b418b199477f95c1ff911b9c
SHA2566b6e4ead19bf078172de8ce8116488d1206d983fb60d0a565e5873bb317761aa
SHA51285b1ba034a8930276ec0ddb582c84ef72a949b41c34da27d7a71c20f4b847be0a565268aa85962a3e3162e1f0fed6ba297f2c6e3bd9e685b290ca59f866d6073