Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 17:42
Static task
static1
Behavioral task
behavioral1
Sample
43681deb5a89fb832baa3c4012611e29_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
43681deb5a89fb832baa3c4012611e29_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43681deb5a89fb832baa3c4012611e29_JaffaCakes118.html
-
Size
86KB
-
MD5
43681deb5a89fb832baa3c4012611e29
-
SHA1
299cd263b5174a18d9b4cb0024738313cfa570e9
-
SHA256
884d63e6a0ca66f5352296d51133e5b69335d3faa91b4a438152c17c18f04b6d
-
SHA512
3a2925ca8aab65d17cb86ed0b449143f8aea693e0da6f3b8914f8e4e389401a21f559728177be2a3de649848044f3f1ce4dc0b0cedd0a993dd4f926198374e01
-
SSDEEP
1536:fLNCGEx04GLqE63rqTkD9/u0nYdtVGzLD/KhJPkZzITNogRvy8qWKee/DX69oL2p:fLNWKk3rqxHEcewMXCi23kwIbemJo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 32 msedge.exe 32 msedge.exe 4900 identity_helper.exe 4900 identity_helper.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 32 wrote to memory of 4428 32 msedge.exe 85 PID 32 wrote to memory of 4428 32 msedge.exe 85 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4856 32 msedge.exe 86 PID 32 wrote to memory of 4212 32 msedge.exe 87 PID 32 wrote to memory of 4212 32 msedge.exe 87 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88 PID 32 wrote to memory of 1752 32 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\43681deb5a89fb832baa3c4012611e29_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeba1446f8,0x7ffeba144708,0x7ffeba1447182⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 /prefetch:82⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11663838623349971106,17234049579633358209,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD56c4c45dd1e2ebec1ef313ed997a4beae
SHA1042216167c7002d24d21367c72beac0092d4452a
SHA256c1291a4ac754313545f2a20279ef3ad61a0d6a65110944fcb395ccbc754488b7
SHA512c82f51d9dbfdb24694870e90c29355c38d30064d13e18fd96ae434d5f44482b8d4a466fcb3decd35801da6c68538543f6c4e19cb241fe82a28ded576c114ed2d
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5c7bb268b7fdf15210558b2a342b137d1
SHA12b84bbd4becb492fda9142901c01c5ab280dc718
SHA256258341ab307e4aaf15a42fef7b6346408901ac61609dd9cbfc42edac21091c44
SHA512b977e47938d81301e6147506fc20efa6a399deeb4fe091c7c7c240d63cd9fe2374a06d3adffd784954dd95cabd7f43f5adca8cb0a6e3c749f74fb39b3cddf86a
-
Filesize
1KB
MD5f41befad51caa636783b26655d2b0aa0
SHA11adea016c9ba2cb4dda200dfaa41110a847f531f
SHA256bf8de0b1a3fd86c331aa31436aa0575a5a712ebcc5b4ef1b161376e9e463cd3e
SHA5124159bcc058abbdf6ce2a28491b4d0017ab7f0bd4113bdc3fa1ab96d20f6b8f4f1cbed5ca0b38d099f93ff426f7ae6aae169fee47b75abd50552cc163e5d0af2c
-
Filesize
7KB
MD598b19876adc0897670effa6a18468412
SHA1af2a7f2b58d43fbe8059291fe33126851b93a066
SHA256bb44187060c2081633399f0722884a0f6d58700984918b09e8b8b4ffe7a24f14
SHA51203b3f2ee9f00c34799247a61a86932ec2aae64d2db496f293f41f18082873f7b797fca3af871836027965778acef1dfda2c98d9b63b783b6bb4ee816af0dcb00
-
Filesize
6KB
MD578ba8e01a38698f64418a6ddbe0f3704
SHA109b60231ea0d6bf9d1eb32d25c68f338e74358ea
SHA256f578fa85f3732ed1c31ab2061bfedb9aa2e7ed52e84d6d49ba12c150ad27b340
SHA512211306df52f99ec7722ff8afeb2972c3a2cc4a92ee5bd4d38adbd469fb492868d5e83f49ca49a389e1263cedf898bc8f2e59f02d356d2b40e504410708ea36d6
-
Filesize
7KB
MD592c551493a2c9cc52facf3c30e759d2c
SHA167e218f49e598a770af10bfaaa5fa204a9fa21a4
SHA256cc9c2b9b301851e31d31f4f64e074e2384a030909b60873e442b33c4a36ee98f
SHA512ec9120fb2b83c6c6d10c71b0dc413c5f6609d0f01b53c1528a35a7b69da8858d721ed144b88e120bcbca3761b97e431433c7d915d0d0967f2f4f537592228180
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD55c3c8b616ae58805a7411624133e1a9c
SHA10593a748a49160d6e6016bcc5f16f6a62422f3ec
SHA256f377f01e4bb312e8925ce088adf546b7df40120422c7502fabb2fd44d6a8e966
SHA51272b6eb5ea850504aeb8fce81abded742e098668f1c166c9d332683fc19dbc3a3a4e197f89304930e1f14dcd3aa3c9c106cfbf0715aba26664e54e072cacb1a49