Analysis
-
max time kernel
148s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 23:12
Static task
static1
Behavioral task
behavioral1
Sample
2c2e17a4ee1049665b19d1ed2bf82afb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2c2e17a4ee1049665b19d1ed2bf82afb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2c2e17a4ee1049665b19d1ed2bf82afb_JaffaCakes118.html
-
Size
53KB
-
MD5
2c2e17a4ee1049665b19d1ed2bf82afb
-
SHA1
f808607f9e55bdbff0ef1a90866aae9b7aede316
-
SHA256
c8d880ce0594ff546fea743f4964e0588e5e531ac60f3cef217d7731d9c8a097
-
SHA512
fa793ab8e651b074e85dad0fec746783468e4754e905b429e778081764cac4038aeb71808a9db28f3d890715db17ddcce86de3a38725022fefb2727d4d1ce40b
-
SSDEEP
768:/gOriWNcaSoagG0bWeu7OOqcDQbDArXoFw+KMtQa29SE:g/CbWkOqrKMtQf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3076 msedge.exe 3076 msedge.exe 1768 msedge.exe 1768 msedge.exe 3940 identity_helper.exe 3940 identity_helper.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1556 1768 msedge.exe 83 PID 1768 wrote to memory of 1556 1768 msedge.exe 83 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 4260 1768 msedge.exe 85 PID 1768 wrote to memory of 3076 1768 msedge.exe 86 PID 1768 wrote to memory of 3076 1768 msedge.exe 86 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87 PID 1768 wrote to memory of 4656 1768 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2c2e17a4ee1049665b19d1ed2bf82afb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8591c46f8,0x7ff8591c4708,0x7ff8591c47182⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2372 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1740 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17287781641434627138,13981080466127686127,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5640 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5accac68c0941c599ed4440e34c2373bb
SHA1545307e22a1e6ed6c70ea5e0def0443ee07c9c54
SHA256aec224d82f180824a52298bf6a014045adfab619806b0b040790e8d4acbcd02b
SHA512c4fe39612aa307439497e2ea0616f3928f68e0a6d73c2fd8351611c59611b46fdd24dcf8ce392c41203368dc00ff4140fdbe709277519a6c74b3a182f79f19c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5e2651f64489b37b2faf833891a05f33b
SHA191dddd87fec8276d79e443d7f44a975a673d173d
SHA2568ea816b8708e70e37d2aa85a75cf45ba8bc504b2c2a3be001b043d9c2e1d6daf
SHA512234aaf7f4876e9e2d38d51034461ec612b7fc2537f3d7ab5f444ad35c0655f38b08f8cb878118e8966d8f9b34e0a4f63e11e78eeab7e3aee76f3b36c628613e4
-
Filesize
1KB
MD536c8fbc533a82a881498ee860db44305
SHA18c33126abc82349bae3bcfec59655c5b7e7b3300
SHA256b66050527157fc91775e25636f9909b80d6b9807ef512ccdd48926a467e907fb
SHA512f84814f577b726334a32086af18e5adea491e2ee308b258365b9e865de1899ff3b778e9dbdee2f3c2869b28ba3d9a41574c0a3a61cbd7a5ec8f2beb23e5baaed
-
Filesize
6KB
MD5dea8ac94b3ad687b8605eb6981261584
SHA1067a07493db487d9226fe0b5617dee07d8090a88
SHA256f19e5bedb022b5b6412c0b387c21e22e6d33367a0cee2c9f30a617776bae3098
SHA5127eae9f704b5a32101d88031d850873ec7338e35ec377553a534f840e16948ea09c6b0315410db1012dfd65d823a1d96c0f5234a3fd7b5e2ccbea4fca8d0e3d78
-
Filesize
7KB
MD5f3e93ffd892d722a87825263abc8488e
SHA1c7f773194ba59413a42a828c88c2d245266affd6
SHA256baecefb91ced7adf0b0781cbac9ae093797346b6ef9289b4bd6447cc4816d22e
SHA5129d803e942c1ad68d7139133e48daa8afaf8d26ea95bc6e44eabb7ff661b82b29688fb150025951230359b48b34f5e02cf1b984d7ef037acde7f4f28931c840ba
-
Filesize
7KB
MD500de8d12c9c6e28ac49f8d2c14d63211
SHA1eb2d3e3d19aedced782c46ce8dbf39ae53f5892c
SHA256ebf32e3b86fc642803e6364d5969a9eecf459cc5c5cbe6fc441b9465812e9d60
SHA51279f9b113d744a99720547f1db65d5788555c7e244673da574504f9f86d01e12475be5920f1df7d80de0d03ed042e6b4499eef2471d7f544d9f0be1bdf50b7670
-
Filesize
7KB
MD5d7a8b0f12d00e004c0015217fc001425
SHA1c052f86d37897b03745ded0221a22dc8a2b364b6
SHA25614c4d1244678043e79e1871107fa87302979b3bd6ce8095d12450022fa7db9ad
SHA512b39e86b2e5ab324ebbb68661e6a46fdb2c09766457e3ff1ea0000e06978d083a69bb805b1cdbc3b3aaeac2b5b19ae125d467b3ac8a705411927c37f0d56589ec
-
Filesize
7KB
MD5b5c218d294d3bdd5e779a36e8c80d4e3
SHA1b2aa18c7972b6804853743a4bd349ea7ecdb1d86
SHA256813caf26b75df79f7677d5f192b23f5f158d38bc33949c03aa109a35cdac3c54
SHA512080eb5b8e39a11e07ada85b4a8756200ff5dc0b79d00dd20864078e334bb9f51a5ea097ff5d94826bb5a3950252a8f55d39c733a511a5f7b96a00598aa7a13b2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5164f16cf0aaa9714e485bda15b3ad5d3
SHA1e6bdab9a7fd51affbd7e96002564a8f9c29510e8
SHA256bf2085b02db1686fa884e10087b9790e4d6bbd08ae2107d1f813f1ab52aca551
SHA5128bbfa925729bc11e05cf70cb8c218a331b0d5c7bd768589287a1bf0901b0e46fe826fc94d6d6d4e6a4a844d474af23aa6b65ec0b0cc1138b53fda8c2a299989f