Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
08411a2128d3c84e74d23726948a9082_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08411a2128d3c84e74d23726948a9082_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
08411a2128d3c84e74d23726948a9082_JaffaCakes118.html
-
Size
113KB
-
MD5
08411a2128d3c84e74d23726948a9082
-
SHA1
10acb938d2636a014a47e6b32f86bd690bf0c61f
-
SHA256
47c0938c61b4e1b0db7bd6ad812534408df199af4867d257e35f630e3f541619
-
SHA512
0bcec7baa266e3e0919a2ac8130bf7f0b82bbc443400c2fdc2c1903d5e411784e60eaad8aa78c40a8e4756cf06ce1f871d88a3d223b6ab632addd95ab5ed2443
-
SSDEEP
1536:AAKWbg389eC6Nc+ap5eOqYmKtsIjS+SOXON7bLkHDca4Ne:lbBGQeOAUVjS+pXON7WDca4Ne
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4156 msedge.exe 4156 msedge.exe 2568 msedge.exe 2568 msedge.exe 2144 identity_helper.exe 2144 identity_helper.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2568 wrote to memory of 3980 2568 msedge.exe 82 PID 2568 wrote to memory of 3980 2568 msedge.exe 82 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 2368 2568 msedge.exe 83 PID 2568 wrote to memory of 4156 2568 msedge.exe 84 PID 2568 wrote to memory of 4156 2568 msedge.exe 84 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85 PID 2568 wrote to memory of 4396 2568 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\08411a2128d3c84e74d23726948a9082_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82e9a46f8,0x7ff82e9a4708,0x7ff82e9a47182⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2172 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,16971765664394258717,10785736536382145280,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
23KB
MD5c897f8479da25ec570027594f1b4db24
SHA181a3ff06cf35a87e697fc4733966dffc270ad06b
SHA2567fd05e325904c9c31e435d5c65b9b4ffa11a9116d1df0282d6cd7c87ef6f1dbc
SHA512b1c1c46810c3bc5c407f7d30a9d74db8242860965d958ffc5bfeed35b1204774843775ae81b8c414ea89322d00d7ab97313965e20cebba588edf13b9b8dcbc10
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD55c49e9b11413e356a8a91d0f9b262d3a
SHA189d313e030dcffccb0058197d07b3b1ff3582d05
SHA256f1694fefe3601cbec83b6e33be4a04992801687272a3b0783d981a0da20eab9b
SHA512cba67e90b743940b901a801e0aa89f2bd55a50c050da7e8ed65bfa06fdf0d922626714c6caf072f2d0a34665e4e87f2fd4995b9a1906510d7184b46f85350a20
-
Filesize
2KB
MD573842abf1466191bc88fad3afb408d09
SHA19b5cf9a5b4ba6dafa8789788b22a64d46b599d63
SHA2560c3332869366356b544df084dca22b8bcdee19023eff784a9e491dfc427704a0
SHA512f84efcf7b460f262399d8a96f446f0a3a62fba69ce0950a92b161fb9d934016f32255b10265061a574dad927fe912a56281a6303c3a2ac61d1d27da086125a90
-
Filesize
5KB
MD5838fac51f11b4254576c24c5a546de16
SHA1e80d12d3d015909a7bb04dce6fadf21c5cbfb878
SHA2569ef704896bd0fa15f72ea93a1d8c486185e13cb05f959a2bb2344bcb75ddcef3
SHA512c10f510861fc27f8374950262ef5683f84e33b9220482e54e0753e981f422d5889f3ad7eaa0a07f70f95c12e72fc03bba66248bfc99538f87d7df1ce24d8681e
-
Filesize
7KB
MD5297a91028681b63800e99f424190feb1
SHA1678a7280b379259ebe432c836d0cc199cc366ade
SHA256cd23ea9c2cb9c9b5d9418a53f16bc6b2a41527c476f11859852fe17b509b5b70
SHA512f6966b83ecb48adbcaa91a8962cc45043f52d92e31bd2efab1f636293fc7a874a3429ff056e48015670f382c596829b1b13f63f86361b5325666021f82f66365
-
Filesize
7KB
MD545f8818b6aea867ee5f5a7983ce53d84
SHA13a99116238267817c80aa070dc009ea3ba27f9ac
SHA2567dc681e9b0fa3e7b599292678dd58638dba4de5978c65224f9dd21e2f09fc481
SHA512ddba526dab6f9dac30f12bf75857c5c6722631f4462ecc04f7a0f02cccdc01cc93612a736d69d5da7cc62c10a703b955ec6420da8e62479fd7326c666f6d6957
-
Filesize
7KB
MD5757d20ee629a3aa8760a696bb8d0990d
SHA10a2ed230f6252cee6da548d581df321ffaff84d8
SHA256d2640d4ae0b161a08268ddb98856f839927c637cf33b5653eb0cc4dd205822fe
SHA51220e0a8a12958c8d082b231e2e9365d9fc70db1a04d1ffbcbe26a38d68e68e1d3bc9b06c1fa89dfc8bad52f3251ab23d7701d4a83a499f4722e6dff79a5aef540
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD559e2abcb51bf66e34c1ca8a3353f09e4
SHA17b8a27086fd997f3ca26bb976fe78002930b8fea
SHA25647e32403364956b86036faf73b527a5ce952772d89a6acdd4360b57fede51d2b
SHA512c4db511111a72d4d01cb16f45d867562b418fdeff445fca76052540f13572448ff56af45700616adb7645044a98906761b7e3fa4b9e9e4cb53d53e3610957149