Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
287238da75d56bca17c66a303c5d6617_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
287238da75d56bca17c66a303c5d6617_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
287238da75d56bca17c66a303c5d6617_JaffaCakes118.html
-
Size
62KB
-
MD5
287238da75d56bca17c66a303c5d6617
-
SHA1
02512e9e0ba3d0e8f7b853db635610f96a5793df
-
SHA256
10d3aaa9e38486c121d67831bedced0b7ad1e0ddcf4d297ff771abd13a63ac40
-
SHA512
1f1e02ce0f3d4cf754ef8c5837a5d665e4cfeeea7d9cb4f6ffa24ea96c92b71138e3f2d501a1ab54a3f560564051b0373eb50626bbb8e026e1e2fff59d1a3e4c
-
SSDEEP
1536:OOBWAoArHcpgjjXdZcv6WbF3JNZU+w5I9vJu+jE1z:OOBWAzTcpQjXdZi6s7NZU7I9vJXjEl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2888 msedge.exe 2888 msedge.exe 2796 msedge.exe 2796 msedge.exe 3644 identity_helper.exe 3644 identity_helper.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 1232 2796 msedge.exe 83 PID 2796 wrote to memory of 1232 2796 msedge.exe 83 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2748 2796 msedge.exe 85 PID 2796 wrote to memory of 2888 2796 msedge.exe 86 PID 2796 wrote to memory of 2888 2796 msedge.exe 86 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87 PID 2796 wrote to memory of 2376 2796 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\287238da75d56bca17c66a303c5d6617_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80bd346f8,0x7ff80bd34708,0x7ff80bd347182⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6480 /prefetch:82⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,14516743495866877372,11587932053550571907,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD546cc200fa9e54558aa1ae31eb14ce9ce
SHA17cbb739675ecd03d47a3ce416fb247f88323cd24
SHA25685ce2d7e53d089cf9f889d4b5e4047a27e506beb12f411bd51eb2fccc98b6f70
SHA512a10af8788aa0481c11df89728f8d980ffce9abb9f3ffe4bd17ea3ea7ea31f22eaa1ae4b43b3b4320496223bce3b1a30cd043f2a37537e185eb1820cb63aa8935
-
Filesize
3KB
MD5cf52699851f1fb8d0d556abb38ad4af4
SHA1b66d3417cda7152ab07e1439daf6091e7fa74de0
SHA256ce4b017cbfc1eb439965b647e58de9be9fcb4b539fa8ca80250061f9a00a6466
SHA512e8f3c2aeaccedf001c5790a005d29c58b00bd776526bb95b1d6ea4cc41dbc2070330eb8384b2bdc52f30a66408752af407664350ea213b5b92b0d7e7a6c632a8
-
Filesize
3KB
MD59c4d948f063eccb9fc2989e4dbb17efa
SHA1dfa7cd41229e23cee29e9c17cf4f1a7593bb699f
SHA256c53c10169dafe67e5d0231cfa3a40edf3fefe2cd1108ba54b4f4249f521c3800
SHA51291d7fde999e9e58e224bd3824467fc6ed7d3d1843fe5d5f67f8159029942fce8fc29aaffc79008044cb8308dcf9c756106e4838c3234c0efc42a9234d6abbaa2
-
Filesize
6KB
MD52e85a68cdd5a0d9edbee3267a4c09ea6
SHA1c3f413c2a34bb407d14988aefea290a9f6339b0c
SHA256a4a6a06414b11cd1842596118c586fdb70b17fd1b8231c4c5d704c2e676d0506
SHA512dcb21df2d419c5ae9c9fd6a0f0d3865870d126b6edaf277252f03e0e2b73a6a090be7d935f68b7f65e1258325e687c5eae3faf3c440229a34678f7942431588f
-
Filesize
7KB
MD5d9ed94ef879fadb6574f0b74d9e9ef4c
SHA1c48a69c12a263a1424582a0144253e059611a68b
SHA256783ea0a9e80b8451b0cd1279fd73e0ef57a442878b0ef57d49a5e10a2ec3783a
SHA512fc08c3e289d1cf713328548a23b158a5c80545b569f126fbdf4f1fb59e2d410ccb10eb003afdc6fe206d2f2dab091a64d160c26e0e32dff2c9011890dd32611e
-
Filesize
1KB
MD58dd23c0726e00c0e0120ebc3ed330f25
SHA11919020dfe9e352bcd8d8d0defe2cafc15cbd4ed
SHA25667b3126950dfe965946bde2ec12001ed3a76b8b9b0bff74e2feff60ff78f1ae9
SHA512d1e301fc0ae4a85e9be4ad3e9eb0d4878de35cf953341b4fb90fb3079b450d9e5894b66bc1d0d6aaab8df160114538bf7e1be6c54c67bb68808d85fb936c71c1
-
Filesize
1KB
MD57f4f5e80473b2bd564abe05b7ff2d3a6
SHA1a9912b8ad2db21c75af06b6dd69d9f42e851630b
SHA256072d698d8e90508f063134ec2f5ade02cfdab098b0ea6d5c41dcbbdff4abda64
SHA5120ed076c25257ea17cfd19ccfd44fbb8b7eeb8251eae4d07e8b3fbcbde052b74011e4391a4e8bb03efe95ab86c4f92a2c485e9fba5979f50ab7502b10a6bc9c53
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56e6d4efc7bce908274f1185ca5e96130
SHA1ab1d53cd90ee882d50cd652be845708e4182b20f
SHA256dfd54ac7cd304557b6a89bd71927cc25d0f085c74e92fd9e81857c3dbdf1eefc
SHA512944c7caaf511546c1d7780c81b37281710370d0235114801bde2c8c028834d4d08fa4f1b115b9281a90bf73b2b478316264e9573494abb2885907994717f75d3