Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 23:34
Static task
static1
Behavioral task
behavioral1
Sample
fd5dcfd448ccd3496caa339156e71ce1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd5dcfd448ccd3496caa339156e71ce1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd5dcfd448ccd3496caa339156e71ce1_JaffaCakes118.html
-
Size
33KB
-
MD5
fd5dcfd448ccd3496caa339156e71ce1
-
SHA1
645992bc3c3ca6f033e713a8ef3964d0196c1706
-
SHA256
285adb309b720d54df33271ac9a978ef22c9c9cf1b6bb05e55d757f2285d6656
-
SHA512
067d1a1b3b98184a4a79b64bf143842d8875366b7a066b05ccca134a236e8bb7be3d99dc2f161ae4cd12c96e199dbb9051cd9d806bdf8bba228c6292d6eae8bd
-
SSDEEP
768:4i/vm8MoT9KYK9WAcN8CBvwe0KJKZjKpP0KAWT/Ru:4i/O9A9KYK9WA/QWKJKZjKpP0KAWT/8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2384 msedge.exe 2384 msedge.exe 712 msedge.exe 712 msedge.exe 3640 identity_helper.exe 3640 identity_helper.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2916 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2916 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 712 wrote to memory of 1636 712 msedge.exe 82 PID 712 wrote to memory of 1636 712 msedge.exe 82 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 4008 712 msedge.exe 83 PID 712 wrote to memory of 2384 712 msedge.exe 84 PID 712 wrote to memory of 2384 712 msedge.exe 84 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85 PID 712 wrote to memory of 1004 712 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fd5dcfd448ccd3496caa339156e71ce1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83db846f8,0x7ff83db84708,0x7ff83db847182⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2304 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3520 /prefetch:82⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9243195618590159774,14804168559285802478,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1852
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x324 0x51c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5f28643e46d01cd07ec47512e19254788
SHA18956fe45e0557ad44844689af8afdeb018c0f468
SHA25695ba110e9e841befe658b8e8b9281d4b7e8bd5245c54971d97109dbc152b6f34
SHA512d514207c6b4367fd1b48d5257d863862cec030de759a3443d34949b142b329df1cbe8bb45b730979956ac660c64a2a6ab1340960314954e4981b2ea34577c864
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5d28a6eaaa5919dcb96fd0451b445408c
SHA1877f5d9f73434df23ea9877007b5e69d3fcc14d6
SHA25649a5b7b2737a7059ce41cfe7a0d034248548b09154b842f9b474fee5f342b9c8
SHA512e47bb4a1eccea97ece7981763fadbfbed97c33197b19327f824c28d0b21c4b1fc981c33aa7b6baeaf5b6e4c7ba108757d88bbf0dbc5afaceb69719f95fa65aab
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD544e84aea952d3cf8a4a80c10b3adb314
SHA1ffaee0f5d05dce07933158415257231b0bf0b053
SHA256c8e38eb6afeb318434000f9767661e5544f6f602378a4b467fc51d9432784401
SHA512cbe9ce707fa12b63ca3e6932b96154a780cc427948204cb9dc00594662388627a814002f7c28366daf3d472e5549f1bb194b5250798f50b91c12322491211f02
-
Filesize
5KB
MD56af587dfec79a10200cbc729930cd86f
SHA1258bfb0bf77456c8bf7f40cdab3f12eb6979d31a
SHA256346db31a61aa6110cc90cc9c2f751f4e17f8efd0026d22c3871fe54a3ca176f9
SHA512d056bc3e65ce725bafc532a5f45bcfa32edf8b0ea4acb06459c14c36c5cb9f344045717cf1de19caaa25c0333767a4a638701cc7b845ad86431c18a6572076e0
-
Filesize
6KB
MD5e026adc55a15be4f7c9809093525e67c
SHA13a46918b033dc5169e32c903a4510a2a7bf23c83
SHA25664fbe89d48f8d8e97c837052e8102c10a3e73ae8f263f30a9cd50fe619bade1a
SHA5120ed88e4ee48b6c68e7033421c76a67018ac435c6f2ecaf8753347091e1b3ad710ef6e3de74d3ed92ddcf441b8fa84d8b17a61b531037cfddd322f6e47bf7b1c1
-
Filesize
371B
MD55109c502b60cdef16bb5d1f1127ab44d
SHA1dba331dca9cd947221f3e7d7e7931932cf48d2c4
SHA256ee59962c06aa36711b553e1641daa319a08bea1ccdda2fd5258dc305f6681eb9
SHA5129841d8722b1b92e3a502f0ff89a35eefccc59f62ba24ffd06e4ee600df8c1401066c15d9477a017dc4eb964572111eaa8673a69f3b9cb2d3c071a9feb4159b02
-
Filesize
204B
MD5629188af8dda05b05386a9d7053f2208
SHA11dde25c44b95b8d5acfe24ae0c88cf739df975eb
SHA256d84da706238f28c836d50e8befd9e9dbbece8a76bb36a5ae33fb91f02ba60186
SHA5127e96c4306a4a16de8e46fba7cc3152b3858a3f04e76bc649ff13604595d866414834942d7bf661feeb7755bcac3401c3b9685b708e3be3e3cd380cf709859d82
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54123fc7f1df31b734fd55dc039589889
SHA19f4dd4b303e575db0d919b7c4bf10e427bd5dccc
SHA256af93f2b0dfc4cdef6095ed12b2cd6ccd2463c4ecc4a4925c3d8c0d8aa3017102
SHA512fa24051e119a13f6809c224103ce40ba166d5ba264b282085ff538a8d1c1b381a5e7a538a15570b82bc57128b3de27ba534cffb4a84f4c94fe3f3a323e33ee9b