Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
ceb02b6ce8ed8e16d1e108946ca2d0de_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ceb02b6ce8ed8e16d1e108946ca2d0de_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ceb02b6ce8ed8e16d1e108946ca2d0de_JaffaCakes118.html
-
Size
130KB
-
MD5
ceb02b6ce8ed8e16d1e108946ca2d0de
-
SHA1
0abc3508d4d33708193deffbd2f7907284b451c4
-
SHA256
69182c373945d3b9294e1175fa3fdcf7b206efc4edcf78c0b1bed817539e6076
-
SHA512
9d87f848a61494fcf524cb9e393accc7ca08077932ad088407c505559b4fe80305c38908fdac87dfea09ac4582bba773ffbcad49963c6046afef11e3b9c4d0f4
-
SSDEEP
3072:De5idprA/9/JtgHtl/bNqhujK6UWmEtEMT/r0/3Nka4tq0ym+Tea/LaJuZtz5CJw:DhdprA/9/JtgHtldyWHT/r0/3Nka4tqv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe 3392 msedge.exe 3392 msedge.exe 4488 identity_helper.exe 4488 identity_helper.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3392 wrote to memory of 4456 3392 msedge.exe 83 PID 3392 wrote to memory of 4456 3392 msedge.exe 83 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 1416 3392 msedge.exe 84 PID 3392 wrote to memory of 2716 3392 msedge.exe 85 PID 3392 wrote to memory of 2716 3392 msedge.exe 85 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86 PID 3392 wrote to memory of 4348 3392 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ceb02b6ce8ed8e16d1e108946ca2d0de_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0a3d46f8,0x7ffa0a3d4708,0x7ffa0a3d47182⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6232 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6588 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,5218577256418640354,11821794420250069185,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2644 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD554a06621b949cf3ab58667ec69beda95
SHA1ebe036f953b4ecfd74873d499c8ebcb6e621e450
SHA256449f8395481fb1fe4dca5259b77ba8d86d6e59229ec02eaea734dd836150af07
SHA512dd4f5f1b413024ce5768baa6860da908b09378957d1f4a0fac54e0782f270f733ec21e6022fea594cd401546ee58353e4be91b04b443ddb84bb59c49c1090837
-
Filesize
3KB
MD5a62a374ec1918b882ca81c99f565603d
SHA1b6c613914eeb0810539d741797f2f559ac2e6eda
SHA2562fbe99b8f65478bd3a6d17718cb33485b821694ccda643c99938685cb09ef692
SHA512cc765cf693b75270ea45733d36f48e4cd196575db884a3b30c0ead4c42727e678078aec705c74dfd3f3776ef0db60d845ac46dc35915d64a2e27852e82584e06
-
Filesize
5KB
MD5c309893a9dd36e3bf67fc02c4315b7e0
SHA15400e53c0b8f5eaf486d675f59fc790b9eb566d0
SHA2567bea89e73f8377c9bcbe4f872c9f18d53a2901e8edebeea74f7a0bcd9d0c6e60
SHA512b8507fad53fab20636e0a7b8a01ca190997ae653217ffb6ffef31a3b9a08e7377e5d32218f1f6fda29c4fb8a0f2a5f0d7f08f78149c1871f87121198d2aec959
-
Filesize
7KB
MD58b1dfd4d8fb3299c725aff5536d40a82
SHA1be580abeea7f30d0dccb63917c0d6b495eaf32e7
SHA25625ccf732c391423768e9f41f29cb3c2a770d01fc1d6ab3d5dc55b143da1cd321
SHA512f84a6926cae47995412e7cef5c88eaf59823b901a3dd910f133f3f60867b546856ef5c54e22a1d5b07cfca0ab4a85f0c6f467dbe4a16248cc96e739840e4fc4b
-
Filesize
6KB
MD53e850a8cd286ffc3bdc55caa3cb8dbec
SHA1327bf3569120e5ded7e418e993caa3ff09ea7ac7
SHA2565183abafcd8aafdc95f22678b64c1af5820e0d318e145475f01bbb635dcb275f
SHA512ed1b0a62266695669160f1965dc6caafbcf0ea362d7ef1de15e2434a822fb132dcf12e7606f00644d9e3effbb590588a9d8a921f0da7feb8d616c26b9013a789
-
Filesize
1KB
MD5e2ee83d0a96c33fca0b24cd3f88998e1
SHA1f1971c702639f38ecbab83f05c07b2c8346c4b3a
SHA2569dbab542de248e66b85a555215f52e09fbdcd3ed9a7721f556a1db2d70fd9ab4
SHA51294519b4077575784a9781c29a60ca7327dce4f00c26cfbd184e77d24a84ee6c26ace9729782dc01297efa2fdcd158730366ed20b2ea163d7bb18a5c532fabe04
-
Filesize
203B
MD586bd6ce6fb1aa081a2a1113e1b5d23e4
SHA170d82a1f37676dc9aaddd14fb18ac7733f573304
SHA256bcc04553d223daf4a65528fabbe8bc5b70570c5af10132c8630314a76c43bb03
SHA512c0a91cd62489970eaf926e9d8796ee8b7138ce0db9577e64e33c67686be303f7cdcd1e428d26af876daffac8151427522aa3f2a5bb694f82090a9a9e92ad0f54
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD585b9481a15e6ae286e15472da385fafe
SHA14e6433f33e0f69a41b9dcfc40d00b0e1dbd3ce78
SHA256b552fb93ba4cc7e8eed77767bf6f99606919e0c333f3679d54a055180bb19323
SHA512f6e62a58a2d3b4b119771cb1af60d31ad24c5f88c2f43ac719648ebe26a6e77ba7156fd36d618b21b10cc1ef37b70f96c87606a756b87363bd14ee8034f27743