Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 00:38
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_692e71aa3405f14cecce3b26aac54a60.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_692e71aa3405f14cecce3b26aac54a60.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_692e71aa3405f14cecce3b26aac54a60.html
-
Size
64KB
-
MD5
692e71aa3405f14cecce3b26aac54a60
-
SHA1
8eefa08791fe5da2be359bca2c55c5e2a1a0d8e0
-
SHA256
efe0bde9ffc852f9aee8c5b83584fcbfad450900d6e692fe41ca6f93d19985f5
-
SHA512
410a748f973322b634eab9fe2a61d6e9fc0555c4971e64f2d869ee4704dd981eb6329b4fa8ff887d928469f47f6f3a0ee91223c1c9940ae8daa9c26c24f5616c
-
SSDEEP
768:jT8sydW6XCABkaIWky1UIQ08lnieyAZK0hiKWMJkytpXw3gX:jT8s16XCABkaqCYnSdytpYO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2176 msedge.exe 2176 msedge.exe 548 msedge.exe 548 msedge.exe 3000 identity_helper.exe 3000 identity_helper.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 548 wrote to memory of 3468 548 msedge.exe 82 PID 548 wrote to memory of 3468 548 msedge.exe 82 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 4184 548 msedge.exe 83 PID 548 wrote to memory of 2176 548 msedge.exe 84 PID 548 wrote to memory of 2176 548 msedge.exe 84 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85 PID 548 wrote to memory of 5016 548 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_692e71aa3405f14cecce3b26aac54a60.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1a8146f8,0x7ffa1a814708,0x7ffa1a8147182⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8389217808594972471,17949531434302678583,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
41KB
MD51da8deabd421929fa1a865599f43aad8
SHA188af7573c39022643333f85b523a329cb6448675
SHA25607b01330c36ae322ea1f1e2ea70e60b629b292b3f7ee7aae5a9968dcf341e685
SHA5120be3f8d02397c3cc32164b116c807115c42a310fd70c72c94b3b523732422ea2b222d8762e81d91ef0c36a8328df4f7ae8e4570c4bc46ab94cbed5131389ea3d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5b3a9a5da68d15710360efdcc52ba0f36
SHA1c848ea396ba9a8537678c459299ebb3168933b8d
SHA2565b4d7a6d0f2839f0644e60a909e68a49b4de790f6d97e56a102d2f63e2de8bf6
SHA51261f4fd48a51e984216c492f708a0fb523550fd88b766186de2f308d6e0e79d6e281cea8ac0490ad69ee939f007647b1a26a6a942b247bbb68bbff4d458e715b2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5c6b0eb30ef1e200551919fe65a7921ba
SHA1eebd7df2a7a2bf08b3c3b5101ad3557ccf1c34dd
SHA256bf7773710de8fc868b36d8b7c1b0deadf2243ef7f25146ca171e076ddead7a06
SHA5129f1b262c335ef1f775b628eaf4942ad220119ec9b5ddc40890c770d1fa4f485c4ceccee2d6cc1018b9c85f7329431843a17c6ce839f640c1dda21e098565d4d7
-
Filesize
1KB
MD5b97d5b3c2e3c474bdf605bd762910707
SHA1157ad9966f722d1ec53aeaf224b332cc164f2b24
SHA25622ade10758f624b8488d727c14110bd3a4b0dc809aa16d62e64ad08c839819f3
SHA51243782a861fa5b90205218f781411fa59382f23a4f9015c5c18ea1cc9bf5d8303dd6544ff6143dda85042ff5064d9c0502047c63119585fd62603a56b72e09348
-
Filesize
7KB
MD5c9dd15b23d6a2e1d66fb86636b4c8e19
SHA14f04e3a77551db9cde4301d976ff3e71d878cd5f
SHA2561242e3a8934e683d13e51a71759dba2386bf9dbd03c2f84266734e88e09466a1
SHA512f52e80f7b1a6e134be7f18a195101df3b4378614e2ea1fba3f518bfa0da30537539c7248095b6d6a95a7226e745f1855d29a9e99f3c06baeccdae23d742c6f02
-
Filesize
5KB
MD5efcc11da7733a9bddbfdc9f3795a193a
SHA140a36b62cc0fa59843d0728d5c6a33a715cffd5e
SHA256de12d06982940f2221f1fbd7c011885771bd799fcc13a23fb366e551990792b4
SHA5120c6498074fee3d4306f2121f6972c43681e2e78f7b6768e88e22b61a5885a2b392c8701ca7321e63f268a0dd25bbe461f5af5d33c93be3485683e91743f3fa06
-
Filesize
7KB
MD59a783726e90855c7abea798651fc4df0
SHA1e97a7f3f33757cdb2288c25947a931dde7803588
SHA25698f72ac6b5544c6b98c3713cddef2153ae2d89d8d27d47b7e5f59cd6d2e61d4f
SHA512040100d2c4dbee677bdde558d78f4dc2dc80ff21c3f6162cce4fc900de1b04180b4922225c264a7b42250f37a699c7ed321bfe5d4779455756e9284a79266e34
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD587dbf66a7043aca98cf4d893e0aaf73d
SHA1adf232042e9a63423acdd95cb35271d7339972b5
SHA25692050027b86911f855c490aa525543b12db61141f163f78e520460db25c6d248
SHA51202f9bdd1ead22c194156603efa2a9fce5bf443cd09fbfbc8350e9ffd03aa3606745dd73bc68afe71f05d74e3e1a79a5b052912cc91842cf617fb173637a73b7a