Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
53988ce908eb391e0411441a6c3aae7d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53988ce908eb391e0411441a6c3aae7d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
53988ce908eb391e0411441a6c3aae7d_JaffaCakes118.html
-
Size
137KB
-
MD5
53988ce908eb391e0411441a6c3aae7d
-
SHA1
b2cee69dc42af0859814166ec5f2066bd60c9ea5
-
SHA256
a68a2112650f76f715bd7a7d1855818cfecf19d2274039adbafcd3ee708820c2
-
SHA512
3cda2dbc55885adecad6bafcdc9c22fdeb6031da8cb064c35f0d090440e56327418a4efc6307db83ac749881bc026353614bdcfb2157a22b722361fe0c849cab
-
SSDEEP
1536:0IWyqbJEEJXFGLMVCDrnDD9BVZfkj/f5w4w+iH:0BJXcLqCDrnfVZfH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3084 msedge.exe 3084 msedge.exe 2240 msedge.exe 2240 msedge.exe 4116 identity_helper.exe 4116 identity_helper.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1328 2240 msedge.exe 84 PID 2240 wrote to memory of 1328 2240 msedge.exe 84 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 4856 2240 msedge.exe 85 PID 2240 wrote to memory of 3084 2240 msedge.exe 86 PID 2240 wrote to memory of 3084 2240 msedge.exe 86 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87 PID 2240 wrote to memory of 32 2240 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\53988ce908eb391e0411441a6c3aae7d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe67d946f8,0x7ffe67d94708,0x7ffe67d947182⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6700 /prefetch:82⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,13497700662879152432,8703062194706571324,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD582ef113f23718c65575a96708a7e62fe
SHA11f64236b9da04a751fb22f52de678574998d38ec
SHA256754028a23c91c156f0d587a3b89976ed8841d65e6f45707486016e03cc8c3f31
SHA512d57ebcbe47fd0399497df34a6434ac3875f0c3e2d988925def2bbff81b76eb8e560a04a0dccb37fc26a596acfce1e702cdef765f630e1a4b40a0dfb4a982349a
-
Filesize
1KB
MD5bd67fcc1ce0fee456559dd172017ea7d
SHA15f048c9ca3a1f833b458cc68fdd52220b0c1d176
SHA256d760e695c57f412335e21f064c4cd57f3068a4b86919a6b26b07dd6dedb1ea87
SHA512cb977fa381a0f35234b5513d569ad2961c13c43340981c87bf1b9894e146c4eae0daae7f302d7bf1ec84b314f00ee6f02c7bf6f1438b050089df3bf9e6b374f1
-
Filesize
1KB
MD5f976a074ea27574f3408f86e9088fd0d
SHA106716a88e3705d4cd064200c0e34b8a307a61e47
SHA256c2eb29992e39336b7e10bff126fc6edf790898b0666b20375f7fcf3d45453d36
SHA5127fe6227383b896eb6f6e1ad0641f312ea01bea353f4608d46831f7695d7728bf4c05d8ee7eb6c3508c072b32126c321ef71abf4a03081e78b05ec84b5976f39c
-
Filesize
5KB
MD5fc4f928ba90a0cca3cc4a5017302ebce
SHA129659b124ad95702acdb2218effe0147393806cb
SHA256b64293dde45ccdb55bbea8178290d5e0b5e91db6f644292e986853dd2d076a1d
SHA5125e57ae0011eaa0ca926e176779b1063ae94fc32b820928dc57da4449b07f1fe42ab9ffa6719426957ae67fb8cce927a042727abd8f45ba5df7bdcd06bcd1b1fd
-
Filesize
7KB
MD59847c870d422e5ab159c6e16dd99648b
SHA1c055a266b4317d687a72beec8e5c7b69ce996551
SHA2568ca046852c2be66c7f1a2246389e56be22f4c2bbbf53136ddc3527e81ad6c628
SHA512e1a4fa34bed72e663bf13e0fbceb4079f267c884e55b55c31da1000f2e7187871ae3c3a85de33dfe5c3e80a36c4716244105a526b464108f59446f2d836259ad
-
Filesize
6KB
MD5d354d833f365b0cc678b43db889be949
SHA111a09ed4ed96ddcf63b43eb6ae29a90a1a7653e8
SHA256233b2269a29e4f2d0cf4c515b4113ef1367acfd92e9c842c45a541bbeb42004d
SHA512bc2d4aef75ba8120f8bbfe0a1d870c9785cf0d8989e78af70eb88e1e2e04a5999f87cb6955a48d2dc8ea3393204f44865577c9d8caca29d9ac8989f38e44bcb3
-
Filesize
1KB
MD5eee86943acd12093f47ece58c653894b
SHA1c36051e091bf10389788d4b4b9c061e4f8f17721
SHA2563157e838ce7e087477dd97dca1b79f75ca1ff70fbf3eef7697a5363fac0ec03a
SHA51248c40c4f172c676e1a797794a4d1ac3ec18140e658be9eadd194327724afd77748e24e773d43fb05fa37b42608aa30aaedd0ee46dc7d4125307f6d3fdbab0e44
-
Filesize
874B
MD5fa3d991ffb4e200e2cd756b01b0271fc
SHA14b721028ac1e260c35e4b8f8064563e65955fabf
SHA2566541b0de9a81ca8150a469a5687b8eff9c60ea53d2fb28525263caaf8aaaac4b
SHA512ad57289f2574d7bb88653f8f68c89feae301046e5c8e955eb5510d715398099ab32a1fe1bfa1ee698ea9614162ab256f8b05f5735b50e21c6dd7ad3cede1cc1e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5e7badffa1acd6d0c3b605d7f053d6174
SHA1ff2c4f0075cf203d38cd2b5ca7e45e4e591be3e7
SHA2566cebe0e5e00645c022ea2a47acbc3ea45e1561b9556547e3bca9459886cedb61
SHA512cc3672a63b08685294199d6e319250b9d9949f3da363a5f13a16f18ab4ece8916e730aafac89e3e7f640079578306c50f21da14aa3372973bc52c9b106f59868