Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 09:39
Static task
static1
Behavioral task
behavioral1
Sample
56b84ef53de6e8b9faae48d4e351b65a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56b84ef53de6e8b9faae48d4e351b65a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
56b84ef53de6e8b9faae48d4e351b65a_JaffaCakes118.html
-
Size
432B
-
MD5
56b84ef53de6e8b9faae48d4e351b65a
-
SHA1
428e5e3361dd8f554f858343bceb711d978b8502
-
SHA256
952ac615b0667c36859b254cdbe977b3fe7edda416f06202ab2d110363516de3
-
SHA512
e3d4dc8940d991a22e528971104127301feb3623eb6d9933983e43e27b07030646a873f70ee60eabc771902fe6eb1573b8be04f0160d7faeb61411852c337cfc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 3176 msedge.exe 3176 msedge.exe 3456 identity_helper.exe 3456 identity_helper.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3176 wrote to memory of 4700 3176 msedge.exe 85 PID 3176 wrote to memory of 4700 3176 msedge.exe 85 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 4748 3176 msedge.exe 86 PID 3176 wrote to memory of 3128 3176 msedge.exe 87 PID 3176 wrote to memory of 3128 3176 msedge.exe 87 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88 PID 3176 wrote to memory of 3528 3176 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\56b84ef53de6e8b9faae48d4e351b65a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92db846f8,0x7ff92db84708,0x7ff92db847182⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3792 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3768 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17526527558322361281,16122542548710900171,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
348B
MD59d5224eab003381869430d4a1e531da8
SHA1ec842ceffd7a108e626768047318db98a0e7161a
SHA256e6936fc6882cb015f53ad7af9487ea1ca9456a1f7fab9c8905507d8f98b02652
SHA5123c12d059d8273ded1d81b435b9a1cb9d7b3494f5ca8cae0f46d22a76be974f2c966de50a533fac716804948acdee4c73717e29507475fbfd3034c32d7cc34be7
-
Filesize
5KB
MD5c0dc0983d37fab860ac485279be2091d
SHA1e7282d73cecdce125e5b6527e8a9215b69c30c90
SHA2564ea256d47e2ac138e04deb1f8d98693292240def12e60d65866e1545163d2bdf
SHA512755098c58f5b0b351146b8a0f5c07619b19409f7839c0d43d5e5b99b623e8524aacb23380f70b1b46fed7de3a831551e931420994a3f97daa52a489acae47675
-
Filesize
7KB
MD5df0160fbe60f60db9189e81a6f11001e
SHA1e722f0c711480186f7d73211724cca9b16a715f9
SHA256f80ac62464efad83f8fe337efa5db5f8fa0a0928ad4228281cbf9a729f0608d4
SHA5120e29b4707f4170d77ca0cae76777c71e668d35c124073590d0333f9231623355e26d0c3a340f600026428bd20600d51d57d6f05f49ed8bd4abb41803485b7da9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5c6aead8a28cd6a1fbf3dca24a9586185
SHA1ac75c1ce3e9f57eec51aabab75a38fbb23f62748
SHA256cc82032407caf484499252212c0a57bb5ff5323a7c9f98204729ba11469a4a42
SHA512e35cf5ac1d21fc44fc76914154db0aa58af54db6a1bf0307fa5155c7b07f5d2f62c513cb15c2f3afd1b95094e3c3d60223954122b5bf1efd16dcf139df3463d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f8b8.TMP
Filesize48B
MD5f7225e6b38da34f33fd7cccb962f6e4a
SHA12a28aca125a62183963653c7a33557df1de5e732
SHA256b15763067982a637b0fe55d92f16606687485691732edf0e6be961c5e7ccdedc
SHA512df36a41195606715356dd313f40fba65eee7a019f63566a858e2fa794534f4e4f4d7604da565295287dd27e23dd28a37086da886cbd461f6943f9f85e8d0e0b3
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD58c535a510d2728e3664f4e738490ef13
SHA16ac3e0a6a9a197366445d2e791e20e797c18fc75
SHA2565997e3c942033efe66c119d4cd027fabeb5a011dc83d76b1be831cdfb4b443a3
SHA5123a09623405f4fd0bca7e2cfe4091aeac663961d02e3e9c4de03d415aacb00411fc8cfc3df547dc1813e9b2e3fc1737e4aeae43ef88ae57fec6122327ef565874
-
Filesize
11KB
MD5bcbdfa0d528ea166e9730673b63b7d9c
SHA136da162671d2950577f4401040d9ff71310473be
SHA2568517cfae4f9bf85b1c37379fa80dbd2368c7b6a5f5c2bff17da0f2c0657cc188
SHA51270f847098b0731749810a7f6e06cdccc8af0922f0664018ba873c21d4ec4b53604fd8e00fb754b8ace38159e95cca9971f47e72fa31f5fa94a9193f4052d86a4