Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
68b7f68ef6623dbf449582892236ef23_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
68b7f68ef6623dbf449582892236ef23_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68b7f68ef6623dbf449582892236ef23_JaffaCakes118.html
-
Size
166KB
-
MD5
68b7f68ef6623dbf449582892236ef23
-
SHA1
a3191d9d8af3f2dc3fc1014044a27b494a28b3dc
-
SHA256
7ddc1722311ab82bb36c4daee32378f4019e4e3a93da54fc06ede31e9e530f47
-
SHA512
e961108ded3bc9061738152f269b094e366ac8eb0a73e328b4cda4c02abe287bb798ff7aecdeec158d803c6140f8e2cb4b15945b00a7f0d646dad6b47b538ac5
-
SSDEEP
3072:FowbmcAHvUBLKfUH7koFK5lU9thVpwHj8W9DomfGFjLt2jdpCIQKtWlkeNVMs8sr:uwicP9tDp+omfGFSpCKyhKS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4384 msedge.exe 4384 msedge.exe 4592 msedge.exe 4592 msedge.exe 3832 identity_helper.exe 3832 identity_helper.exe 5712 msedge.exe 5712 msedge.exe 5712 msedge.exe 5712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
msedge.exepid process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4592 wrote to memory of 4432 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4432 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4504 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4384 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4384 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3460 4592 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68b7f68ef6623dbf449582892236ef23_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe344246f8,0x7ffe34424708,0x7ffe344247182⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6240 /prefetch:82⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6354049999611162725,16390669939893689221,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\537d8fa7-1078-467a-b3eb-91f6e37316b4.tmp
Filesize5KB
MD5fcdb41c3e0ff2c9845769c0caaec25e6
SHA11a8e547e57c28d8a1c96b79f85b9bb6f47262417
SHA256048d50794b49cc9424bdcd35d543420dbe550c56f74065c7f0d89f391605ebeb
SHA5129dce9d91ceda42b656c5095dd70d15c60750ab39689ef6d566d63648ae8512ea2e4640ce4963dc6fadb24504ea95b7118068d78939ca45d280af79986536d0e0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5353b38e4a88d32c9fca9c93d006767aa
SHA1a323c21b52e0bb948cec5939d5c69c1b3b7afed5
SHA256f286e10ffcb0d4bf0b06c743af3000769e4baf524d9bf61307d6d05327649063
SHA51265bbb91796ad270125e22cfb6fa0e8036cda495e51bc0d23b9dc1504565ac29b99470e55a93363085e6e6e4e1147abb38d17bd131abaed374b5abd98bbc5d379
-
Filesize
1KB
MD53a4393b7da4cc3a5738002df6d9c58ab
SHA1b22028679eef0fb71e28d899c6f37944a7520420
SHA256365f4ea2b5fc890dba15593fde44f7b2b803803fea559ce59c5e04ebd7675a78
SHA512744064d828602f30eb7bed6bafc2e44f72ae615e6d35435ba959a03b76f292dd20d017ea105b6458449a8a4155a01a837b97912f04ea3f0d440c4dc2781a2dfa
-
Filesize
6KB
MD50279e4f702b687d1d7e9a613df7bff97
SHA1e971790e039873458fedb5eb6ecfd3312650eaa8
SHA256f02d8d21d8f23b20a94d78b62ad051e3fe4d581d868e873fe592e492753ed992
SHA5127fb1be8502c5e3a4433d662e5979fcb287870a69ecfeddf37f67bffb297c5ba7bc0dccc94b0de5a8e35d4f0488d0b995f0c37a06ebd2fed2de61c75217cbd28c
-
Filesize
6KB
MD5c70d736b83965e8588dcc6a554441545
SHA1b86ec069cbd1ff829a4aad56d23772456691000d
SHA2564a23841b72b24b4ea784b07fce828c6a77079a176054a9099b922dd605c09898
SHA512ca66eceda5d976abec51345bf2ab0ef630ee62a2f1b5f321914fb370be6ba8c97bfd2fec383b8faa17e492ad76f403c3c8e8c220f0183ba3acaa9202fcf7504a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5251c8b1b7c4cf8a91da5682d6fef859f
SHA148ad71c182f4ccb8db229adde57d0e8edbd03c4b
SHA2569ea85dc83a9122a78a5e362a15cee70db8ea8708644daf39f5a6d2d119d13e3f
SHA512933647d2f88d7fd55d4db147e8726959f2ef9528a75be35a0821aaa2d97ef5bc5ea8f96872c49e68d72395804cd30fa15d98d688c3a0b2e40023632adff73aed
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e