Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
63f48df7928b68969587b56fa291cab9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63f48df7928b68969587b56fa291cab9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63f48df7928b68969587b56fa291cab9_JaffaCakes118.html
-
Size
66KB
-
MD5
63f48df7928b68969587b56fa291cab9
-
SHA1
ee5d5d8824d3cd1a87f919d9690024dcbca87e43
-
SHA256
21430f438e62e6d2455283a6e3c9ced2cb9b13205dad33b4198b55712d12109e
-
SHA512
fa74cfa90d7fffbb3d10be651105fe526466cad4816408785a3634ea6193fce2585fa456703750223e952d14a129496542ddb8b00562f2b8ebd8348718b4e841
-
SSDEEP
1536:0OREe0xWEFa5NHlXG2WfmRQEBzZt3Cgpdn9GlJ1OaPEQSXh4ddpkJMpvsqydH08W:0cGWEIFXG2FRQQzZttstcZRKvkWpvs3w
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3052 msedge.exe 3052 msedge.exe 2876 msedge.exe 2876 msedge.exe 4496 identity_helper.exe 4496 identity_helper.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2876 wrote to memory of 2600 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 2600 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 392 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3052 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3052 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe PID 2876 wrote to memory of 3832 2876 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63f48df7928b68969587b56fa291cab9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c0ef46f8,0x7ff8c0ef4708,0x7ff8c0ef47182⤵PID:2600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,10692946060292931155,9042326646190622272,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,10692946060292931155,9042326646190622272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,10692946060292931155,9042326646190622272,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:3832
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10692946060292931155,9042326646190622272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10692946060292931155,9042326646190622272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10692946060292931155,9042326646190622272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4232
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,10692946060292931155,9042326646190622272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵PID:4384
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,10692946060292931155,9042326646190622272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10692946060292931155,9042326646190622272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:2028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10692946060292931155,9042326646190622272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:4456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10692946060292931155,9042326646190622272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:1716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10692946060292931155,9042326646190622272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2056
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,10692946060292931155,9042326646190622272,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD53ce3dcdc59f8a3bc7affa81ee0147c7f
SHA1226a76f3bf06480de0475867bcd5cabde6b4946f
SHA2561a3fafd40e7b57600c1ccfd187973272edde401be7d4b082bda26db3337900cf
SHA5120f530acdc5e77c793a1087e30a4f09f4bae138d23db08d1b06f3f7fa095e1fa8dbf759a98885192cc3b6604e96a3cb2c3670e4b9c307a172dd931ff991d68b34
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD567db70b7dcf3f6516e6d719fc2e86aaa
SHA1d48385d832568e0a286a2d27fd03467ac42335b8
SHA2566c76139cf773e3eefa7d5ef6007caab9e3ad4d63cc6f75e451cc242ec39f61c8
SHA512b80ccd59ea07765e23b3a2b01d97b7598ea702d35c6773da43a824f6730877816847a90b8f062ceafcc60576867e5d34fa0b258c7d5d2c08707c3201ab3f85bf
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5fc7a4e0f54a1fb57bad532933c5c3111
SHA13d60b477fa8b83d4c91cd97e0f2862dc9cbc8d45
SHA256acd65eaa052439fa1298c372a19dbca1f9209f2ff28c21fc4561c883f401a941
SHA5121907413acc8a6e3ba5ae2316b4ed73bd8a6d7faaf92e4fe3cf0eea449d42d36e5b72d8ae0de26822565985e9215f7ad74c335c9696bb39e9c40036af74a13023
-
Filesize
5KB
MD543e6fb894e3366023f4e0db4407ba725
SHA199e04f71686078aca5ab18053365d713c443813a
SHA2560a7828b58bca8bf19233dbbdff1a72c20bd15de535b54f0df710620d8b661461
SHA512157f6a090acb0e65b76846df5a893e5b39e0e687c33b6c01523a619c9812dae4e318ba7bbfec8cf2230121e6edee4511a0ffbf66038e9b88795224c3ff77ab0d
-
Filesize
6KB
MD5b39d4be019271d80f11ac97d5b405c77
SHA10434f414a2a9ac277ffc27c418f1463690495745
SHA256d365af795c0aa3ec2e16549a23eacb13b167a8f62e6892469d029c6e4cc29c09
SHA51252f1dd122d71d39e21befe761f95d69dcb829d4c67dac9207d764cbea6ca5216dd5583820e5ccff0140539f7c584a8fb58cc9fe56102de83e66d8edcce2235d0
-
Filesize
7KB
MD5c6f51f3eecd2af795457dc8238977e4d
SHA12244c1df3e256040bc98dcf05221398adc0e7534
SHA25647abe33856f7594bf8fa9eb03fc6c2ba0f7d58e9dea972190170a01a92ee370e
SHA512be889937b3dcc4dee56bf445b324a09072b16f6b7aa526036b62f3dd8c42f61eb11fa565b6573db292002de0c4516c6fdd6c532a6310f6705f7aaf6cc863275d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58dc663b04427a0a37bf5321a80504931
SHA195faada6e532dcd174544ae1c6f15deb811a0bac
SHA2568798b6218e6f860f2b3fb20805898761eeab0f27f7138fe1ac747e458edd3bed
SHA512505a40717805bc9c8cbd724a369d1a317ae85b9104d5f513ffd16727d53ad1bda764022d4b7097449719183de27d0080e77b22c5d3ffdfb19bc78d832676edaf
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e