Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 17:27
Static task
static1
Behavioral task
behavioral1
Sample
4357f924f15bfdbd25bcfca0519d5fca_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4357f924f15bfdbd25bcfca0519d5fca_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4357f924f15bfdbd25bcfca0519d5fca_JaffaCakes118.html
-
Size
28KB
-
MD5
4357f924f15bfdbd25bcfca0519d5fca
-
SHA1
36707fdf175d337a4c4191aef4711efda9fa62a8
-
SHA256
147af660d1b13ab6c1e08bcd54d41008e68d01bd440715e9241d698757ca9b96
-
SHA512
4f388a59f31cb502ab6f3de13cceb80730400cd5c9faa27ad01c3a53dce093d031acd1583d98859b63a52c69b6dbe4a01f45b0d5b915cb659ea4792804e53f13
-
SSDEEP
96:Sh1GWBCigN3d18nrIULB0+jnQhWEK14QiAk9dqYuodBmGUz0VXIEgBYrkxQpW1IY:ShNB5899ddgGC4Xrn8WT8HQLkCAWE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1045960512-3948844814-3059691613-1000\{BED5D690-4576-4937-905C-3D9EAFCFE077} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 1700 msedge.exe 1700 msedge.exe 3208 msedge.exe 3208 msedge.exe 4048 identity_helper.exe 4048 identity_helper.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1700 wrote to memory of 5040 1700 msedge.exe 84 PID 1700 wrote to memory of 5040 1700 msedge.exe 84 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 588 1700 msedge.exe 85 PID 1700 wrote to memory of 5008 1700 msedge.exe 86 PID 1700 wrote to memory of 5008 1700 msedge.exe 86 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87 PID 1700 wrote to memory of 2224 1700 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4357f924f15bfdbd25bcfca0519d5fca_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5a6646f8,0x7ffc5a664708,0x7ffc5a6647182⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 /prefetch:82⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5908 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6948 /prefetch:82⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6728 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:5404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,7399596388505702702,10100076962302827454,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5006b13d6d2ff4fd6cf74fd525694f366
SHA167e50bd6ae78a632e5dd62845e885460453a857d
SHA256a7f774d2fee943c161e989751ab829e7782f1a3c51662642d479b6f6ac14f7ff
SHA51294ddc2766fa72d1aeb6070e8b9233801ba4fbda1ef43375bb9556e2d147efd57b59a8251fc1a9123ed9b501379832b02a641b943d7f104cd5e1c7c074e0df554
-
Filesize
2KB
MD55c47fa880a107eee12c2e995b3e2d37c
SHA1d44a32a54e99d7b65a462d690edd9391c6a88ee6
SHA256fabdfed8daf528d6823e66ed1e6d7d4724b9f470d62e7d281eb622a6a54a8ac8
SHA51235c5be8f05d52f9d0742415258170e22100b16cf412cbe27fec98b24355a0c209aa8a965227bb93e577d3646d7c08216cfafba15923e15b2cee54493eb6e5de6
-
Filesize
2KB
MD5d7b3df1d50454b963a18ecb8b68f1215
SHA1699c035fd95981267b7ce6557ab6290106f79f60
SHA2565c6b4e78cce04cdb930c36dd9e68045a5844d78237206b20f57a9400acff0dba
SHA512eacc08c9a25ad866c610e70dd36346264f12f503f780550051fcc04bc9abc28d347f94683ec9e7a74cc6a9f1316ec3f1c22d01882d95e6a9002f3da484c619d7
-
Filesize
6KB
MD5c1de288e872256cdab5b8b057c4b0753
SHA163a775a9e700daa6e802c41ad7d0321811595337
SHA256289f98c571cfa4eb0c3a90039adaf183bc4513ba04fe5bd95e9c3f9f8c3380e1
SHA512df3424be12b76f42528ea19e19a4a360124f088001d37d3ebf721b367e63b6f66ab803efd8a653f21ad8b06c0982e7973133f49d0ed2e7cb0f99e5fb8c82c0a4
-
Filesize
7KB
MD59ccf5c2ec6311f6e38a2e46655364eb4
SHA12e195a0a70bde5b8e33f0a3808771cb34e9a6fa1
SHA256255433816c00365ad4d143d34c0b852629fa3236ee453c127739d05cb87c9b9d
SHA512507ebd747e14730235bc9046bd99cadd1021e5a60f15105e9b514dc37cc37174d6491b0ebf2920fff6f476c94022cdab80413eecb036bd635a9b925031957386
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d4ef7f9bcd1322ba2f5fbd7c8572b0b1
SHA1e2e17424aaca7ec9303ca748f1aa54a6b183e55b
SHA256f29b6cb2c236991c92e9248b844bd4efa510ab25cca8a8a84a23e8889952fead
SHA512645784c37e5a311fe6db56662f297d14afa4d7be2f3df6fa5274f4e384dc26999dfda0fb4ac325c36b2a54eebe33bfef71bb7310bad78803206d280dacd72b2b