Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
749bd3c74952a692689230d4a1dad45d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
749bd3c74952a692689230d4a1dad45d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
749bd3c74952a692689230d4a1dad45d_JaffaCakes118.html
-
Size
116KB
-
MD5
749bd3c74952a692689230d4a1dad45d
-
SHA1
47f30a682d5216ee531f4c84ee1194499487e8de
-
SHA256
61ed8abca8d613ed94bf952d4349b7f9e0c92e39ce5cb07a3a9dd0a5a2da9538
-
SHA512
4385c68a933967b862950cbc740b627a957713b8e2d8a910be7cbbd28b7f3e9fe18d7d45098e86e6490084b177192db9473f755885f0deab089d187242a2c58f
-
SSDEEP
3072:wFvqbIrqbIV9cbuKXd403E2cyStAch7EeRte/gzVb0:00IIImGAc1tE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 536 msedge.exe 536 msedge.exe 3684 msedge.exe 3684 msedge.exe 3284 identity_helper.exe 3284 identity_helper.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3684 wrote to memory of 4052 3684 msedge.exe 84 PID 3684 wrote to memory of 4052 3684 msedge.exe 84 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 612 3684 msedge.exe 85 PID 3684 wrote to memory of 536 3684 msedge.exe 86 PID 3684 wrote to memory of 536 3684 msedge.exe 86 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87 PID 3684 wrote to memory of 3260 3684 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\749bd3c74952a692689230d4a1dad45d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab34146f8,0x7ffab3414708,0x7ffab34147182⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 /prefetch:82⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,7847067759614048678,632434103626595248,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5576 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2968a907-a735-424e-8cd0-64ab0f0cbc69.tmp
Filesize7KB
MD50822ed8dea98b801fb447b0d8d7adc8d
SHA1d2dcd81d90b475e64b65e53efb63eddcb6b2701d
SHA2568df61c0045151f969111bca2d63cede8e5fdfd73480233aef8c070708a272b6e
SHA51276afdd8e5f2d83478cbc79c73cb21e94369cfbd47ffe8ac1535ea0baf880553914fc99a02d729437f80c9a3ccbba97eeb99dd777da9467e714fef11567890aff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9a145408-6d95-4d55-8723-5b06bcb041b5.tmp
Filesize7KB
MD5f0443414a75920be38e6b98b035c9c2b
SHA1b363a327f039679460e10223abf0982bf327de67
SHA25604e93159465755db5d2574ec77527e431e1548d700c8f7d0fc09da9b512c34ff
SHA51266503795d61ad8a5bedc062321c8aa88fd23fee89e9df19b96bcbe0688dc54dbe39602a1916079d3fbb9f63655d9d9dde923566da9da1a45984129affbe03cdb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD59e50c6b280f6f572620bd51472fc7607
SHA1e0566d37e6c22a6609b1ee7a47d1bef71cbc973e
SHA25644bd1b3613cfc36da42747e9dd3eb8c0df7d2f51d615617d5313e9923cc506f4
SHA5123c9eedfa20db2d832cc015b63c03ce9ff9d784de097961b35b49e42a3bcb6925de8123d3d9f01417983b63a1207f2a893da873d2a4bdbe713ea03588a5bb32d0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5f6e492e72e7cfcf12787671cfe0a8c09
SHA16f716532da9f5ba87a581c57e4d6d446eb55c1de
SHA25668dceefedd00971d06387a9fdbed5e549043f1e3c427904ba6d7ba80c79fee83
SHA512ccee3c52875c3bf1f856d7e098b181afe6bffc6eeaa28bd2b4bedf4cb0b065e67b4ce92f26eae092aad9aa71dafd50b8f8a36f0e3e90be08452a84e21d99096d
-
Filesize
2KB
MD516e8054797ef236b54f7f78935c23dd7
SHA19e6ad6bceb6e1a9ea49014b88b3ee5d7f41a468f
SHA256a24bae27828b8dcad4da4984476c6e0c7296cb586d03710d72c34f694b2b003e
SHA512286439bbdc311cfbf5f76c00be733be4b97ee3ad3f5c6a676e5c33d4d6348730e0db3f2f484b4362eb3b125ef58855681eab258a42369ece1318100babb255cd
-
Filesize
7KB
MD5c8b791ed59bd895c875739f2facdf1ba
SHA1af60d41558fd98c4ec5e61237f683326fe544b56
SHA2561806a0633e68c9b5bfe193dbe5954bb7640ed305bc8df21a003eabfe15259e7f
SHA512a3e2d511c3b9285c0277f9e09428907c5ad0a9cfe85087775802a11771f11c21ca6f031b6fa92a67b0789245b27ca86606e92bb57dd014561561e2601195512c
-
Filesize
5KB
MD558070cd25a8a20d2d12153a9db60723b
SHA189232e49defcc156bd1ffa7ab2324e4450fa240c
SHA256eb42e27152dcdd103223218dd395a0bbea417e49d905b96a8486b34c17fd079f
SHA512460787767c4a87115870158c373d2c422f770ac581cc05e754060c078015d4b80395190b7988bf8a3cca3650a9f18cede4cce0e81e944e7eced3e58823ec38f9
-
Filesize
871B
MD554052c2ca6a3056e42b6710464ac4ca0
SHA14cd6e71f464600a36e6eb07a3ea9293ed845dd83
SHA256005f6044b288213913d8dbb509663cd3d92574afae37e9e83f85c0e56fdfeb07
SHA512ef4ba3dde8cbb6b12868c7a2d23b405c905ecf99b68d1c7d8b14217bb37b34dc7bfe40e34f80c4b5927b602d705968b5e478d6490bc9bb4d3cc7f17fd0ab98a7
-
Filesize
871B
MD51b6cb5ed52c53f0d9ca25ef6605cb653
SHA17e6b1215c80b5bcc701fde914c9446ee9a77cdfc
SHA256c97ec91055685f0ae575420bcc23e5a0fde45f8818cd294d10ad0e0fdcdc3282
SHA51279f19362919fcb68342e15600747f478c3ab7faa88a467276d4d5b69f8bfe1080f044593c0da716e9d05b89b34a45ff561c07acb130d5e731a8683c7bebf7608
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c86d34f76dc00b3d2f31e6dd963da40b
SHA1b8cc01d1d6b3ae0273863c1ce2675905b35c1e5f
SHA256cf5e42ab1be809e699e0d4e70206d98bd3cfb3772c8eb77ee011ec58f5defeba
SHA512edc72401106c9546de43447c9d479f6c37996401309369e1130671bcf711357919e10cec93bae8972bc64a7a293c9912fc07fb06451fb42226cc90d649a93a3f