Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
bfd0d3d25d8fad502c87ac1b01f90e2c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bfd0d3d25d8fad502c87ac1b01f90e2c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bfd0d3d25d8fad502c87ac1b01f90e2c_JaffaCakes118.html
-
Size
27KB
-
MD5
bfd0d3d25d8fad502c87ac1b01f90e2c
-
SHA1
8c925c27fc944e855ce20d6f98a0879f6dd679b1
-
SHA256
0084f50b94ac3651bbeba9f8465ac59dbe18e40ac3489803f445ca17efe5303b
-
SHA512
e3fa50f8515c22304ee3df282857fdcafbdc183012e693e3ea649c09738fe623e591845519b6aaf63be1549010e3e8ab06366fce9f6da4365958e55bb1f1b1ee
-
SSDEEP
384:yhUt/jIBEe8TugP+UNu/j8QBOnut08A0r3:yyFjIueuvPPu/1BOnut55
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 3796 msedge.exe 3796 msedge.exe 3416 identity_helper.exe 3416 identity_helper.exe 5236 msedge.exe 5236 msedge.exe 5236 msedge.exe 5236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3796 wrote to memory of 3024 3796 msedge.exe 84 PID 3796 wrote to memory of 3024 3796 msedge.exe 84 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 1692 3796 msedge.exe 85 PID 3796 wrote to memory of 2196 3796 msedge.exe 86 PID 3796 wrote to memory of 2196 3796 msedge.exe 86 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87 PID 3796 wrote to memory of 4820 3796 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bfd0d3d25d8fad502c87ac1b01f90e2c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b8ed46f8,0x7ff9b8ed4708,0x7ff9b8ed47182⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1964 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,15993564688401325618,10611260916182881004,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5b4122870f4b387d9fb5b42cc702c7601
SHA1c813689170371ba3d99da4fb2e1a1808012b4aad
SHA256841248a77fe08032be8c95f36a0611add01081bf277dbd15e182ecac1abc56bd
SHA51256a0f87c2305f91e8a7ba70d71e92afa9af936ce72451060fce384c32a7f7804dc83aa62e7b2cff3f0b793e340aa1f8504a837bcafa8b920b1ab6b46d91c4928
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5ea0ee0e76b75aa5f0b4eff9f069e5c52
SHA185b473fa82686889bb6b2d2b7a911f10662ee6ad
SHA2562b641287d83453cb62f3864224ab881295a5cc2780f1ebb3ea232249eceb5669
SHA512ecc31a43ae854892b15348ffb9c56c3cf4b6c49be1bf62b25e1b3a2075eeff9093548bf7e56ee5fc11cdbc66eed4ec98d7f40788a29db4bb787183bb7f42ae7b
-
Filesize
1KB
MD58996e9424c37a53781878ae292c7365a
SHA1c481cdea7c30e3ed90884c136ca30ce4e198d1d1
SHA256de7ecc2fe79e63499fdeeb449d17976566c84798f326f15be28a34a68b283c5e
SHA5124b57715c9a327451c4ecdc92cc4b40782003b5352de6eb3ea87803954ac17de5ce2c7a61df721bd01e75a730accea6656f7d2f6c408b1d7eaeeb7aa8201e3a35
-
Filesize
6KB
MD58f375a9c90c09f00bf3c2f93f30614c0
SHA192f537a2ba494797017c07b09b69efb1d23c8a2f
SHA25643d0894b56958e336c59e99bfa39e5ba14bd25eb7eb3f2cc79a51df4d1f4a977
SHA51209be31a338d70f53ab7f7bbf80a62c15cbc341ee07ab55f1c050d8fd288194684bdb6a248a3c81d40a2d90bfd4ff1740ba75357ca354d46bab96e8896e034e70
-
Filesize
5KB
MD519ec181c44963f37fb58c713d900c5ca
SHA102174f906a719a185777fe45f27894e0bbd11770
SHA256e2c4b66c3154c2b7b9974de4476af8a17c6f18da4b087e3484d7cd289c7c0754
SHA51274cdc5838baacea2a9af34ae0b6e28ad327eb623afd386a0e550b4ac51bf30798258f40d1a7db1c73d1c506adeed91b69d78b2c20db71551c41199b7a5192091
-
Filesize
7KB
MD5f7b4d45e69ddffc05ec947c7f1b1935d
SHA1cfc81061f76c5bd204a6cc0137dab6796300b1be
SHA256ce49461a0e4a33a4b816188032c1e265508f3aaacdb35cb9759491e9c1ea624b
SHA51240c4624b34a48dad3bb153b4188ab19142bf376574877e44c12df2b828e4fb377b0b6461b70a8e0fe2036b242be0d9452a59d4431cfadff07de512da3ef30f28
-
Filesize
7KB
MD5ca56d98d2f1c79f15eac9f6078684ec9
SHA1df7d376d1b2b1ee964bdbaaaff7009fbca2dd0bc
SHA2562868d12da191e1d9a73687d620ad924ad1cf40793bae31548d3a52929301bfce
SHA51260582391d79630b8e169f94b1a37f36f622c58cd47ecf5e2616d37cca749a87d6e1751a60047eb3ea67bbe7d23caa78aeb41ff8fab9db6de78a121db868f2757
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54576c3abd71e47c5f1373e744f846c97
SHA14cd70e5a7079ea24ef0b61defef0a37b172f1bbd
SHA2566bce16c791de6bc6ae626e5dab9a90cf0021c2aca411b21608f4481f34a3caa0
SHA5125c6a8b738d931efaf5129682ed58b65695232fd65412734d7d6da76963c7d3ca1c223cbeacff23605ae0f49386164bb57ece590cdc2a225f05fa1fb866df45b6