Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
ead3851beedad3289920ff3eb60c6466_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead3851beedad3289920ff3eb60c6466_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ead3851beedad3289920ff3eb60c6466_JaffaCakes118.html
-
Size
39KB
-
MD5
ead3851beedad3289920ff3eb60c6466
-
SHA1
fd71620cd3c30dc61925d992c09ccd112eac3236
-
SHA256
f0d9f06385ce6e250e5804229f55a4d1e186b5d3cc926cee2099d6a701c644cd
-
SHA512
c57cb812565c121a9a3c21932f3c16c6443fd937510f9b1cbbc86d79db5040d4a15bea2f49cd28d50942079ec0a75bc6be2a2f4ee5c8c6c95c7becc58c9e0ac8
-
SSDEEP
768:5VQrujHO0+bC/5mix/XiSI3+khaqsptF2Bt3vOm70YH8yR9soIlBu:5VQrujHO0+bC/5mix/XiSI3+SaqsptF2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 1036 msedge.exe 1036 msedge.exe 5056 identity_helper.exe 5056 identity_helper.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1036 wrote to memory of 216 1036 msedge.exe 82 PID 1036 wrote to memory of 216 1036 msedge.exe 82 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 996 1036 msedge.exe 83 PID 1036 wrote to memory of 4632 1036 msedge.exe 84 PID 1036 wrote to memory of 4632 1036 msedge.exe 84 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85 PID 1036 wrote to memory of 1436 1036 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ead3851beedad3289920ff3eb60c6466_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab4c846f8,0x7ffab4c84708,0x7ffab4c847182⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2276 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15193095439231781646,2446280178611831187,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5c0b1dcf609745f64aff00bfdb9a759d5
SHA142e07c4440cf2003a5ed8593e3f1ead7ab2b0e7b
SHA2564576ab66a750a2a3a51a272edd9f4e8acff5843d3d610597db59dbd96b67e108
SHA5120e8c9f2665e156fbcb30a3ed871397c3d7ebc20395a5c8010438d4f8434370044487fd29c4733e1d90a4fb01308ab50f41f25c798413089ef24d43ed8ac7e408
-
Filesize
3KB
MD5567640322b0cceb5953f16576dbc3931
SHA1bd965d2220a5889cc111923a4912518aa48d598a
SHA2568c77e3de4f087fb4c5bab6feac60971d413e58501432cbf52a276fd38a4b3711
SHA5120290813d461785f9a4a475c482644e8145e18f3c54b3632779b03e67737d1f4ac43ffd2800ee50ef1280bdd448eda9fec229055da67eb8df42799603718a59b0
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5be7f481d37e64eb18f0b6422cbf90dae
SHA19389eaba896b041a8d911f00f9fb058f3750f8bb
SHA256416c28fe4e4d9d0a9c511cda4506220ce4acc229245d7dd801c7003e615e9909
SHA5120b46cf5435c14134eb485f079b96eaaf091778a8566b67d250a0c9626ea347b77a26bf9d83d5b5ec1a80d183c11a6b3fa327b62901d679f38b2916e598849b58
-
Filesize
5KB
MD5b337eef116c5ee9fb3984e790e9b243e
SHA15d87d7c3d072cbb840a3fb46a4406d4b59f57794
SHA25683f77be522085b76c42967dce50b2a3bb0f6b17d01af11bff915814cc47a1ec4
SHA5126f7a1f80c21fb455bf6e0c836fb856477e80890b37e096042f6a6c67c366fec03ba1b3899400aba80467944fc781d5071248859ee5e9c8d4c14de7e4080c57ab
-
Filesize
7KB
MD54eefa350f78a5ea5d9e292f7a9a0f521
SHA1c028c4b2f1a83ecb8a8b5db5ab5294d8944d8dcf
SHA256d0111f288947b680a90e480bbf1bd5e1d3bad45b204c82c3a7f2ebc723a379d7
SHA5122c9334ea3a74cf25e46f842cf507812eac33db0b74619c82e518111d2b6414a5f5646b44208e82c30ccd2fca1b169c19967bcc43c3ce6f303a28ff8e8d675db3
-
Filesize
540B
MD5b7d69f08dbe9049dd51c4f055811cdc4
SHA1f8e03a7f1366d1560adcffa52e8bb59db7e0e16c
SHA256683d7bd8e4a30377843dfb6b3352fecf08c260d9d1363334c897312564977459
SHA5120ba3f5aae9330d49ff563a7b58ee02b20957092f7fdfdf83fe8bcd7153b7970f6d8a484d32869a566dd49273b2ddfc25d724688f2d3422c50b58f999fcd69222
-
Filesize
372B
MD53481d5dc439d97b793b17e8acb7c864d
SHA173a43bd17353b3185fc3ed302e3fbe0f324a4dca
SHA25683f9959738e56495ff2b4a2777cbf389420a0e779065f8414f32c6d3b3acc9e1
SHA512070f68a0afd3a497116c3f6ad04e0223bb36f494476d58e83ec0c18b581b195f7d3a56477f65cdb80b61e31967ffb4ad56730400bf8b89a7c11efb8401b157d9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c2ad050848c05d6119c2853e0a9fb3e8
SHA1938b1bafabb2a4669e75d25722f92426709ed14f
SHA25608f006230d1948448d9dede73e5367ffb4c80b747e878533b69803b53d6e0869
SHA512222d183e6d62e296d3f07d0521e6d86bdc66f28f9c006b43cc4e9bb045a9e9ef449196fb6570fc651ff65bf4c8bffe37d07d2758bf550f490e92fb8a85c034e7