Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
ea139ec71ae51491885a0159513cbd51_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea139ec71ae51491885a0159513cbd51_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
ea139ec71ae51491885a0159513cbd51_JaffaCakes118.html
-
Size
77KB
-
MD5
ea139ec71ae51491885a0159513cbd51
-
SHA1
d10afc3ea83c5dbf60e92b9b8872670ee51f014d
-
SHA256
6da41b9ecd265d82a9f23683897c094173c3b558d8c539a2a30991a402e2238b
-
SHA512
5be0f0d6fae1fcdc9f4ce518fee75a4522b7ef7a5476af1993b4b1ad3b1a0c50becf3854f0e09dd2987245281ed7044f60f295d8690ec763817586a434f7cc68
-
SSDEEP
1536:RLNCGEx04IBE63rqPk46x56pqVjswlqTbD7JS:RLNW8/3rqPk4o56pqVjAbD7JS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 3628 msedge.exe 3628 msedge.exe 2308 identity_helper.exe 2308 identity_helper.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3628 wrote to memory of 3384 3628 msedge.exe 82 PID 3628 wrote to memory of 3384 3628 msedge.exe 82 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4504 3628 msedge.exe 83 PID 3628 wrote to memory of 4680 3628 msedge.exe 84 PID 3628 wrote to memory of 4680 3628 msedge.exe 84 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85 PID 3628 wrote to memory of 1004 3628 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\ea139ec71ae51491885a0159513cbd51_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa586746f8,0x7ffa58674708,0x7ffa586747182⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2480 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:82⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6240 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,3052950330658897189,10796914091138387711,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD566d982f290c6104f35a398b5e3c35496
SHA1357020ab7c675f80eda2b65858419f0a34763fae
SHA256bab7b2b89357856c3ed345aa4af75ccf2af8d947b54722d4dc0132e8c81f00ad
SHA51209bbeb91a326a1c973eb4112ebd3cb85968afb014f572bade79552b6b34622f1af624fa983cde602665dbefcb2c6f7507b72f05f5d142f106294c73d3f1c4509
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5c91816d401ffc9375c1eb6170e0861a5
SHA1ab5abc03d312e99854e19bf332c739b328693b6e
SHA256b0698234642fe354ebfc39a241456c3c4b77c75a50a7cede666ca49bf9bb3d80
SHA5129e8fe144b019ba5da9fb507cd548e41cbbd8b0270c0a4fbbec459385dfaef7326e867fa6e75df3011642bef3b283edeaacc02fbf18e2a800e69c5de28a2c93d6
-
Filesize
1KB
MD54661a14fa2070945a1ed740c30d657d8
SHA12d15df0bcd0f8b82fa90d2bbd212eb630ca9e03d
SHA256024d1cda2542c2311e72b6298a2aa969162776865ee98d9d41169a3b959e6053
SHA5126f7410d43ee4aeb0c765ce19bf58c2356898c27e0288b85cdaa4586441bb32c2f893039bf330a0ffc455fcfa52649085c37e2516e3f32c437d8431b010ea0b28
-
Filesize
5KB
MD5b21a9753d71155e7e634b20f3803128a
SHA18154a9f8b0ef9712363589faa339e702c77f47de
SHA256c83cfa1c431bd62a2cd0f7e0dc1e8edd91ea283133fe0bdbe89c987fb2255829
SHA512242be436647ba49fba40c1be37e8b1449517f630fee3b2be56e1633ff7639a91078dc33db24ccd5da8fb56baeb4e2fcb80868c3d5a354cc602bb2e1c5bb0a6d9
-
Filesize
7KB
MD59a0065a62b0b558c2162c8ba8b5cd7bd
SHA1167ee8f7e39c32649d5fbd3a1a6bf240ae6f0a0f
SHA256e33116edf126d8d819122699bc2d513a3eaceb0b955384184d03dd1b147e9094
SHA512d94d3fdfad3d9b4eecc6de1ef58753e0c41dafe9932fc6d07f1ee5810b60cd08748b77dab3c2f12493387eaf9a6dcd38a17a211d7db7ce262791b968e711f5fc
-
Filesize
7KB
MD53f45803bfa0a30cef6c716d9dd51b568
SHA1fc417b36c9ad2a8225be5e98bc4a559681800efc
SHA2562b08a69600a415a36a344df6304130d91bdc7d90e7bc16281a152986e737a39e
SHA512fbbd619c2629b1217a63bab5bed96712760c3381404ca79abc3c9ad1b1c52153a3c9359c7079be7cb2dd59e68ce8a867009b8adaf84d3c77effdf22e8e77057c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c10b4216feed45f37c182c24979c5373
SHA16f3a846dbd8b1ecd2fdfa681d41e610803ae4e5a
SHA256d0296c96d2dc2f30ca6866b9a85879e0f577ebf9cce3d5af289b4425d80a84b1
SHA512d55b5766ac4393baee3362b81cf1237874647db9dd5b106ee622784f0dcfe8931019983cdbcc5fbed43dd9cbc3ba1b9b946b34ada8d205a7fee7caae97d228eb