Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 14:51
Static task
static1
Behavioral task
behavioral1
Sample
2a7cc68691cd229f383e65e80bae53b2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a7cc68691cd229f383e65e80bae53b2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2a7cc68691cd229f383e65e80bae53b2_JaffaCakes118.html
-
Size
12KB
-
MD5
2a7cc68691cd229f383e65e80bae53b2
-
SHA1
34c310ac481112d49f7c99be21af6e25caeebe3a
-
SHA256
5aeae6d2b49a67fce19d6c073197374c78ccd1fea3f2818aad01f816d411bd25
-
SHA512
ee9f369cd844dfd1ad7837e31937cef8bda3eab1d2bdd049d585680335192fc5b2b7e62931b76668713623d005ce165d7086ab83ef0d41d3f90094e8197f9a52
-
SSDEEP
192:Z3qAhUObKY+p36L4VCUUVVNQEjHOGasXWTzHRfpZd5/FYRToCyqWss6s:BqgUObop+hN1/m3RRZd5/FYRjxs6s
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3120 msedge.exe 3120 msedge.exe 3732 identity_helper.exe 3732 identity_helper.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3120 wrote to memory of 3144 3120 msedge.exe 82 PID 3120 wrote to memory of 3144 3120 msedge.exe 82 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3508 3120 msedge.exe 83 PID 3120 wrote to memory of 3632 3120 msedge.exe 84 PID 3120 wrote to memory of 3632 3120 msedge.exe 84 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85 PID 3120 wrote to memory of 2856 3120 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a7cc68691cd229f383e65e80bae53b2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8537f46f8,0x7ff8537f4708,0x7ff8537f47182⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1876 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,2384857746268953809,12425165730471976196,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD505e02ab7aad81f768d4bb7dfe01a5973
SHA1ff1add9f8e01e1d80831b11dabcdd8ec9c89f670
SHA25654bc5fe55736f6d55113bb870cec9b6c194b4ffe0561cf04633dc20ef98d859f
SHA5126e9a1b234df6ee585e025289578e8a0157cec75541999f4ded40050454be8b580a683cd684434af9d453769238c5d4aa660f38328676d055b82e4a203cffe083
-
Filesize
1KB
MD53a4a93d06c54b7567403ab995a3a1b59
SHA1634c70c59c5d45156d40db6e9866fe3a24959bd6
SHA256b27e392b2364faba4aea089c920b2e6e5838a48b3889a2769dab789e1376227b
SHA512cbf87b09a806d4d7541ae78bc790fbc4b61f5ef400a647f0e5fe6bba3a96e573bedb5dadcefc6e115569b57a85a69b45a7ca7b064be69bac618f6cdc34a2bd68
-
Filesize
1KB
MD5ab0359e6a09ea77f5f57f8edefd02c3e
SHA1cbd0997efb04d8c1ae7aebaf93bf6e8a518af282
SHA256b2a9ffd6a8f7f02608ab38648296c195b5f41a5e17f1aa896b6a2f6e6f3c21a8
SHA5120880884b3c199114ddc1e39c9e718e3fbe1a30903dfaa847d050029ad5676537e33ee8f578d275c1da7b9b246d962a4d4128c7c5fd07ee09b898f3dc3df7a052
-
Filesize
5KB
MD53743607a74f6128d8d349c147205f2c2
SHA1c3eef24a1e69d9402f45e09a9cfe7fbb34db0ec6
SHA256120c2ab74fca5fc94d6aa0deaeffb36f806be3a3bd79c63f2371dd6d94be0e2e
SHA5124c5dc54af4c6b5935c94535abeeebf301a9b3e41b95b22e16044e2d44c81f2de1c088f4c1aee582d8665aa574ec0a6c244029329fc0ea59bb1f9414517af3813
-
Filesize
6KB
MD5c6ea84870b92597a9dfa6960f4447b8a
SHA1c4f7f9c4dc88d671e73fc271b6898707d70edfb6
SHA256b0cf8893852991e961a786ebe7ad79413a81f4feab087969c12fd82fdaa23c6c
SHA51239e77856252d6a8192b3341b3312df10fb7d87a739b2718693a2cac36584e9690fe911b38dc83e09a792ab3975b46e379a88f2764627206ad4d7df47fec1d517
-
Filesize
6KB
MD51c21bed1685770728da3d440490e614d
SHA158856518c801d53a9ec0480a2ae17b171cae4dec
SHA256bcd5cb612d3ee609bf22f59239340a75d50e52dbc19f5e3591b477a7f0819edf
SHA5125c42c68f1efa5ae62091fd319a6fb9605f0100c4e3820ee3d954f44ad5d5d811e18096b5f11f26b6e40386b8b02936414b11cc09ff77bb66adbfd2bbd7b44781
-
Filesize
6KB
MD5bfc1722f46036e67f4f390f22fdaa90c
SHA1366f52e1b256c6dce1ffc39c23dc0302d24a02a6
SHA256b62da2c6ce5a44657f145870fc9e83f1219f81cb35d017eff8af89c23d60e948
SHA5128894929cdababf8c2b9075dec29e6dc8cf0ee173926ef3c17a7116bf5dedc55abf7bcb57bcdd129ffefaef177295492f071a2b9e880f86c92126fb8c3238ee09
-
Filesize
540B
MD51afd00be7874e6f1f3334c4ecf34b5f0
SHA1492a093304a8c5b755aaef39f7e4ac18937a3c86
SHA256e32d866d69234344e5dfcd4cb816eba9c74d68e932265b4428b01a54fd954f29
SHA51292844002b57e4b597291661d39518cb92356d6077f4bec4deca37cf475db04854ba5dae92ef794c8a2f2feeeacdeec3b18318e9c796579997940762a644be1e5
-
Filesize
204B
MD5bc87af852b2077c70d7f3c32f9f97fc9
SHA16f9bddf01794eb4ac2f16ab13a42dca7ebcb901c
SHA256ec889423ad93e2f719b239bb6a1383a0107a90d3abd4f9b22a829ad49dc1870c
SHA512afc1df1306f6578c5779e6bd9df5db6cdfa295b40fa52f7ba08e72a8b6a207afa16c9e6ca7731f7403e7c67de684fcdeb66c19aa14e48e729fb24d3231341f26
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fc4aa69bbdc3257de5333796b2e34c73
SHA10fbfadac15cd5bd49e8c318ebf17f97654fec043
SHA256de9d5990a39dc7d5371b42b5f1f258c5586d71b88589edc52cd53a590009277e
SHA51287bfb192916ca147bdd130305b402b29bf6cb127db1f01e269cf92b36a29bdfbf1b5a8d3f824212929d75b2407d4a2df81709942def50611ce1ac49d6e71116b