Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 11:16
Static task
static1
Behavioral task
behavioral1
Sample
5c5bcdb956c47f37fdd7454a8be13ff9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5c5bcdb956c47f37fdd7454a8be13ff9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5c5bcdb956c47f37fdd7454a8be13ff9_JaffaCakes118.html
-
Size
92KB
-
MD5
5c5bcdb956c47f37fdd7454a8be13ff9
-
SHA1
5c56d6a193b8c5677c6e8578a9fe92cf04fc4aa0
-
SHA256
1da093341a2a6f327c52603591cf05500ee5b55b218fc4a68e863c9d452b6891
-
SHA512
c4d4fd3aea27c1bc2acb7d343c496bfc6d0a0f2d5c5a4faef1a714009c2ec8666cd01de9eeddcf7089f3efad4ce5c8086c32a44f95e8455b4813ed2e342ac273
-
SSDEEP
1536:NNLNCGEx04G2E63rq/gyiFeBLrecxZcAXeHJQ2qKeNLEeJQeCe21+fQe6Phe/1Fl:nLNWK03rq8pPr1QXCv3kwIbaIJD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 3940 msedge.exe 3940 msedge.exe 2136 identity_helper.exe 2136 identity_helper.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3940 wrote to memory of 4760 3940 msedge.exe 83 PID 3940 wrote to memory of 4760 3940 msedge.exe 83 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 684 3940 msedge.exe 84 PID 3940 wrote to memory of 4540 3940 msedge.exe 85 PID 3940 wrote to memory of 4540 3940 msedge.exe 85 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86 PID 3940 wrote to memory of 3120 3940 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5c5bcdb956c47f37fdd7454a8be13ff9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff6e146f8,0x7ffff6e14708,0x7ffff6e147182⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13339100006449427802,16321589589386251958,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5bfe65debccd05f4bd9a3314b9965fc26
SHA1c5f4ef41819acbd1a4b5339f6e611cd0b41c7d6e
SHA256b57e3c07a38a5a87f066d3749cc632c0e502e831d7c464b202295bcb680d4908
SHA512017a9f0a1260d7dacbd6f55b18d01fe004008881beaa535d0c91245a7199752fa301c367340bb2e64f62ca0a1c9416640b7a34fc6192fa8d7a5cec23ca810225
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5b463ca74e26e08e927d353fd4a03ee43
SHA1db8349b234e5bb500bdd85611e5bf63b1671176f
SHA256182483e16c1b39fd4109199c939a45cdc7e7c24d5ed95f9dbceaeacec10b5297
SHA5129533b57882f50a1008453e03f362db62e4a3042a6ba41eabb0e31ae31b5839c9792d75d99dee5a8fb7a0b64241c44817a664d5881b772b6670e3bdfe7e51815d
-
Filesize
1KB
MD59f35dc60eb4b64cc94cffb16b8d6e1e1
SHA181271a4d54f98c34925a0f05a74a4cd38947b41b
SHA256f3f7bc831c2d33e66545599e38b217b1c9fcec974842e3006495793f3653ec47
SHA5122a9affab2f4d9677909b63701ec53bea7af79349042921df74505cf7b2d112a7940207e131699810f2d8968e27ef3f21d082000a77a3591d560b6640e0b6086f
-
Filesize
7KB
MD52a659a76755c6933d112ffca235c4edd
SHA160f016c3ee3c1d458321e7ad3e8e0e2d7ed73e70
SHA25603538a364fc965fab34e58cc6a78dec0af1ebd068521bf8d353e13870d17c075
SHA51255c1cf7cd9df377e27c697517282928ee6674848128c80e0d36badb5cb742b02d11b0f4c713d16810e97407cb8bdb4c2192d67cc0c8cab8e67460586cba77606
-
Filesize
5KB
MD5a1a46a810d46d8559a9bf0588a13efa3
SHA1e9853ddb1b37558509c7cd6c7e03c3e8518900c7
SHA25682dda88063bb66a32ae5c979be76073c7c3b27b164386a29a310a19ed6c117f9
SHA51228ee90dcb5885fa6c42799f60bb6a8677de00c39a4d63cbd64d408f41f049cf0e47c81ee944af3302ca54a4ca0e0af86fb085aa8314a70e079187723d685a364
-
Filesize
7KB
MD5d18fbae0f9e86e3c048b983cce772860
SHA1483dcc452ea867fce8eeaf88344d13331186e8fd
SHA25678a2e84a42b42331814979e53cb33b1d353caccaa15105f1d3ccb140169e5111
SHA512cfec2ad6d130973da5c9e439f1e0da21cca88aaa62325f1b6d719babfdba340fbbab648d885b0b7170a4cdba508107424a2d486666ed84f7bddd11ef734b7373
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f15fa0ff7df7e0629cb959d2393ea628
SHA1f212c603a807b8c5e37aa64786bebd924ffa303e
SHA25619c52df4b93360f35e510a99ef4b0a18868da4f259d33845f9f0b9dfdd146037
SHA5126e69387a4376d8eb7d1979e63731f73178d3ae1053125bb297f83d204259c25fb5695db2f5f01417322fa50b44bfe93499b4ef1b7ac1b8a0a23bc2a4967ddb81