Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
c28a303f2fa2112ad4fe0ad7b4c8ef1d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c28a303f2fa2112ad4fe0ad7b4c8ef1d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c28a303f2fa2112ad4fe0ad7b4c8ef1d_JaffaCakes118.html
-
Size
48KB
-
MD5
c28a303f2fa2112ad4fe0ad7b4c8ef1d
-
SHA1
f89663a546a4a84585b4bd42d5e520196927266b
-
SHA256
f51f377737a52384b2e272b079280ac55e378de821c6df80e3271b0deea63d3d
-
SHA512
71fb5098d31eea330590bca9e551f2da765be5e9ad005f6ad487b85590aea399fea5c0c02c4fc1d1a59d647de770a33afb610d11a35195dc9186c580cb2d3b34
-
SSDEEP
1536:zmjEyZillrzKe3fhVhQwkP3gh5PvhJjhJzzJBavAjuTJznYvjbgQuMYLoTUMSR1c:zmjEyZillHKe3fhjQwkP3gh5PvhJjhJv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 4244 msedge.exe 4244 msedge.exe 4956 identity_helper.exe 4956 identity_helper.exe 5920 msedge.exe 5920 msedge.exe 5920 msedge.exe 5920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4244 wrote to memory of 3960 4244 msedge.exe 86 PID 4244 wrote to memory of 3960 4244 msedge.exe 86 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 2028 4244 msedge.exe 87 PID 4244 wrote to memory of 3632 4244 msedge.exe 88 PID 4244 wrote to memory of 3632 4244 msedge.exe 88 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89 PID 4244 wrote to memory of 2228 4244 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c28a303f2fa2112ad4fe0ad7b4c8ef1d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebdfc46f8,0x7ffebdfc4708,0x7ffebdfc47182⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6860 /prefetch:82⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6424 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6460 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:5348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,480503945790673480,11791623953138869679,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
21KB
MD5c3a1bf5fbff5530f55ad9f9fa464f25c
SHA1449a621b775cbe1d3ab69c54a0e18c0ccf6d6caa
SHA2564ea6b3a39d794db93d1084770cc340272f8e5ffd5cd8d0c05c1f5841e5dc13e0
SHA51275aa617b33be2eabe9f67166d14939d58abdb2396b9911dc7ba612130d2ba9adfc90a3cc9b6de4dd6cf8731c90f2ca74b7f9cfaf4a9d0bcbf90d03c907e45a54
-
Filesize
212KB
MD52257803a7e34c3abd90ec6d41fd76a5a
SHA1f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD56fedbb887d99a7a75108f3174202f320
SHA11ff8942a1bc0a165c3a702c34ff8f893e1260b6e
SHA2569619215d41c83c8c18a5ffe4ecb166fc489f9307f890a1f5f30384433cd706d7
SHA5129fac20cc763a6e546cf0ce498714ea268b85e21bd4984c3a65d6dd23d2b59da5bc18255a406c9729c9748aba035282e60baf7f711e2f747b582cabca5a9c9157
-
Filesize
2KB
MD5e222be7ab35ecdf01d509853c442fd71
SHA106e5b5d991052f1bd9eada8b418a8ab76701ad63
SHA25687fe235d12d547385ef587a42923675d03a2bff5741705a60132e6ce629d7b35
SHA5129274ad80cac5c09b4301eae57906e2bc6dad9f88b8f98c98cdedbdee8fb497aedf1c8aa3043190caad6f37b2690024320c281c479972e3dc07eaabccc92ed0ef
-
Filesize
5KB
MD5b20b18ae19f7e486534a3f9b2883f2e9
SHA1a0abaddca0eb3548d1da535d61be6c5ea9c310c1
SHA256373a8261fdb4ba4c0da41647aa57a7dbcc2c64da5948a6b6d06870bf0a01c6d8
SHA512d3efc1f9cb6d05e065db56ef6a3a464668305292f91f0af54039c0292f7d7d9c88fd38e8be8b04a2a69c23fa9691f96ea9c8600805e983f93c098f500c09e584
-
Filesize
6KB
MD50c5d4f7d431341feecbe4d5835d615c3
SHA1d260c699690242b5569b65681fe9792007225fbc
SHA256adabe30f220730b74c27085bba80ab88bf707b042283a76832abec292d6c0cf8
SHA5123f94ac5ba012ee84917ca4f11b5a54b203fdb3dc6878554a7ae907530e9d56d119933ad341294a47836abf2bcd9d53be15a6b0deb9e8cc0df7b1d1aa4262f925
-
Filesize
6KB
MD5141fdf3fc45d7a237fed1fdcc37be39c
SHA19e58abe0c8654e85e135e1e04dca81888ba9f2b3
SHA2562c1b65a9fce86c881922b81b9de89b34615e5a3344af7c6bf20c153282cf0377
SHA512de8bef25a3e50a629c049b061b69308e6a58406c1a140693d7329c7648e2319f6d38e0636a066ca02adc2243002ece00d76354744f197fd12f30a7831d4bbd7a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD552576399933c45e573cc6585fb2794e4
SHA122f4d3a8de30923ebd6d873430ae68920d32e4ed
SHA25618d2ac1dea4be3e7ca20720f205101a421bc92c23e7f8827eab12bbf7946e35b
SHA51238a0fd2a4cc2fa07e4b850b8d651296b0cfcd9d6cdfe982f40995cc1e14664a6edf5e6ba23a5f9f714c8097bb4a9087b8d19bced828b4ed92cbdb02422f4a371