Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
099e5eb1b90e6e3d73bb9fea68821617_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
099e5eb1b90e6e3d73bb9fea68821617_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
099e5eb1b90e6e3d73bb9fea68821617_JaffaCakes118.html
-
Size
150KB
-
MD5
099e5eb1b90e6e3d73bb9fea68821617
-
SHA1
f0b4c0c6d39b53f5d7a3be4bac8c688216da6745
-
SHA256
f550955c3a9c7f93c762b4db4c4ad19bbe76a078376d95fe2d8d715b4c6ec227
-
SHA512
a93ce6fe0ff5475f3bef37f5f7d57bbec3b37970180f909236017ef83fd71647b051c9ad2aaa33d0675453fa281145eb541c60bd966125abb0a21fb8acd668fb
-
SSDEEP
3072:StadceCjeCw7DUcjvG8rMUU2qimLi+SU5tiZ39:rdceCjeCw7RuSUg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 3828 msedge.exe 3828 msedge.exe 1912 identity_helper.exe 1912 identity_helper.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3828 wrote to memory of 1404 3828 msedge.exe 82 PID 3828 wrote to memory of 1404 3828 msedge.exe 82 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 4844 3828 msedge.exe 83 PID 3828 wrote to memory of 2328 3828 msedge.exe 84 PID 3828 wrote to memory of 2328 3828 msedge.exe 84 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85 PID 3828 wrote to memory of 3460 3828 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\099e5eb1b90e6e3d73bb9fea68821617_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1a4646f8,0x7ffc1a464708,0x7ffc1a4647182⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3880 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4050650987521690050,5305707758394412484,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
23KB
MD52f24e0f5d2c2997a89fb4a8d943c141f
SHA199515bde1a5bf72105116ac902ccf3db1dd3df29
SHA25660c9ecaf27ba56d7c35aa78c329aa7dfa586e6c71ed3cdd0019ba7e767b18aaf
SHA5120f4c5508dfdcf0ef63141df8d29c76e219d2ec433d59d37d7f17e110b455f24235fd0bc4f539ad5adc368285536d73f57dc4e21e3201dfd5753e76789208989d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD537a76b10e44056fada27c5227a5e4085
SHA1f1280124511c29486402f1b95290cb11e0f45270
SHA256f16dede378f2fcd0eeeb27823704627fca125be90311f048ed0b738dfca3af66
SHA512d9f3a38e526ce0abe80c0426bffdb780047a97c692dd019018479e3138292fd6bb6019248837f98b4940b9e3f64d44312ef83a65e15f6fbb31b231c474467039
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD557c527b363bc733888a272f92986a235
SHA1c962e316ad76f1a7560cda722cb00d75687ad2dc
SHA256cd518ec581d34129c1d5075fffdb7c7badd5ad080c868ab3a38343578117a286
SHA512583b0a6639ab89b9294e28626a4a0c62a79e8e2f3de98068f7a516d6dff5daf37ed14bf3ca844b1126ed743fe872a557ec2785179e16d2a3d1a78c020a14c0cb
-
Filesize
2KB
MD5ad4a09b4ec81ebfad4be156650fdbfa8
SHA1c0f6d801e69fd679181afe87b2ba3720ce839344
SHA256e71ac4971fc8e4abe1d61c066dc4863f52032e79f542d398064bc3d512ced19e
SHA51273881fccd92e4c1e25bd00cf49cba335eb14ca5d100e7b68ac8029e1839fed74afa10658ee88e30c7f7b677381cc7b8a15ce539844394d24d1ae6ea91e38e405
-
Filesize
7KB
MD57bfe7df290bf130322e74416e2104228
SHA1e945f2737b4cb1cfc55acdfeb2e9726088894168
SHA256a7bcdd946b8eb19309214fe905ce8b63579e9bb3bb4948b273c9616ba3d8c554
SHA512eed2b5c1fcbc43645710a26834c5f65e789480bf3194135db143420978c1d628b943d2ef894290b911c5332f90bd7a9e11b9bdf1e01c54eb6d9cb07585c4786b
-
Filesize
5KB
MD5479148f143bc0c6ec3265a0cecf6291c
SHA18ab629e06db6d305080f315ea3beaa54b60448e5
SHA2567e74df5856996592c068fe95a60c3518ce53aa373ae3f42286a8be978ce0f811
SHA512cbff77b0fde9baecab7cd366ca4456f8cc21726434fd78a8aab079f6551ec229fe1fc7ad45852154be0ca5ce681ce7d168fc1c9a6919374bb60d364f8f16b8fd
-
Filesize
6KB
MD570830d527480114d5662cbc3eaed05b7
SHA10701285941d04d5e943442c9725b3147757ec473
SHA256d27287720c8a4e2c5346789c9e6ed623bc7e43bfc93223e7d02dfcb91930f313
SHA512cf4efd3746b67d6f7d4ed34503b05268b7c250fd2604c64a0d33794063661bbb2b85c8192979da0a177703b6668b89782547732c58946a05e3040e89db395e52
-
Filesize
6KB
MD505b888ba28649ddf6381e25663eb7b40
SHA1638792502d3dc90e4dbc188399d1653ab3493089
SHA25688e3ae36cdc85f4c9ba07059d909ddd2d6c1f56a5d907d27dec02949e3934aeb
SHA5129301ccd55086e9c4eb76e08ca7cb0ebbd8a23f9306eff971325d0366e50e51d548ce4d7fa20369196f246b69cd967dea8df9ce2ad07b3579be6fd4c3d3e62fbe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cf66b1904e0c56b100ba192beb3b2251
SHA1ddcf5603f6b78f4c4bed7f26aa37d09df574233f
SHA2565e5c88b9ac74f25bcd8768764569a87ba5fb3eac8ac8b95c1bfc94cb5da68ddc
SHA512d67df558a801173b12fb15547afc3dcae5f6ca1da62681fd748abc14cee26fddcae4a04489eefd7af80be7389225c83bc7448dad7591e61f855dbffd74fee378