Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:30
Static task
static1
Behavioral task
behavioral1
Sample
68db4c09f3ebf0df3e5e1ed4f6a12145_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
68db4c09f3ebf0df3e5e1ed4f6a12145_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68db4c09f3ebf0df3e5e1ed4f6a12145_JaffaCakes118.html
-
Size
34KB
-
MD5
68db4c09f3ebf0df3e5e1ed4f6a12145
-
SHA1
9b81fe9b4a677f1fb46725a5f90bb588c8a4b9ef
-
SHA256
1c870076f41cdec15269ea251a0375964b1051efa65eab63e8d75c4eb5c874e6
-
SHA512
93c69b758a26dd52c34ca65a8cb15143936d74f35c6f011f06444791739fd787b102d9c50b5af435a6a636c4906b7cd1d1a45d2b8020af6b0ef5f0c79d803d96
-
SSDEEP
768:d1l9c98dk7HtM1oU5WJJhMjbH5dY0kwSrR24AcuVkuguC8hyuFflWFZ1u7J7:dC98dk7NM1oU5WJJhMjbH5dY0kX24AcC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3976 msedge.exe 3976 msedge.exe 884 msedge.exe 884 msedge.exe 432 identity_helper.exe 432 identity_helper.exe 5476 msedge.exe 5476 msedge.exe 5476 msedge.exe 5476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 4860 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4860 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 884 wrote to memory of 4684 884 msedge.exe msedge.exe PID 884 wrote to memory of 4684 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 2256 884 msedge.exe msedge.exe PID 884 wrote to memory of 3976 884 msedge.exe msedge.exe PID 884 wrote to memory of 3976 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe PID 884 wrote to memory of 3040 884 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68db4c09f3ebf0df3e5e1ed4f6a12145_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff956ee46f8,0x7ff956ee4708,0x7ff956ee47182⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,2993297455263634132,4384966831567231578,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:640
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ec 0x4c41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5d39082804da192ac0007df9020671454
SHA182b35a3eff0cbb2fcdbad0d40fc964ca6b671517
SHA2568b9227805dc775c5ede383cda69c45285b07d407db98308cc21412a1d7151ec7
SHA51223ea132552f7cb3c99f67018717a7c5de3e07ca43e2a1538a6f39fcb678c9eb3ccb2720e148e16a6b90a3c1c8e7f05761fb6fb4e4df3f584f06791f621d0bee7
-
Filesize
2KB
MD5e1a684e34e9d7c146b0ebc06f68855ad
SHA1532a34b67cebe5fbc713324ce000baae0a6e17a6
SHA256d46ca7cae2f9da7685614496fd188ef9e02825a841e497e5520e4125a4eceb55
SHA51269e83388f3d4ea78ed24b23246f47448d676fb6145f515b8dd2ed69eb8ce2a9de42a564d27c115e56ce264ae42b8ce6d8d8bfa26a40bb6db5849928008c9e739
-
Filesize
2KB
MD54ec042c08638bdc29efdd48021a10bc1
SHA10c2d78822cd5c9ca4c1e500b92b76668ee6a3006
SHA2565f99c6530acd940f79f187209fa96a53ff995cd66c2dc82168e55648efac5fc5
SHA512e164e1ba3104dd79bda1fcf096006cb284fc23c5d80a3d2f6aed5daced027f15e1aa499d37cdd2e6199f9efcbecee698bc8db051010904ac12fd4729bd532c35
-
Filesize
5KB
MD556f834f95908599a5c7ddf2a0ec17255
SHA1e1128e51b80c177d8b7917ea36b5acdb4c80b6c5
SHA256f343976902960e102d4a9b50227a23284d03cb07dad46ded066bac1a22bd22bf
SHA512b9592d830d5e1560a3341a79d880d7326dfe049c9b4da4ed4236ac44b746b6123f4f1f485ff34510fd934e5a4b580adae86b2f1cb3b41b3e494a073dd93fe294
-
Filesize
7KB
MD53608ecdb03bd0bb8c8dc06ff9b7cad5a
SHA1ecb62aefa64c73999581caee1a4f10f8d284b12f
SHA256b7d54a9035e122573ed2ebc13604b6687b1fefefe9730414b2b4c176900d4131
SHA512106beeab8862fed8e832dde1b15dac205bc75d8039d8e448170098ee3b7599d735b0ace27dc59d48b3bdc57b3d565c07eaae327df6e336c2b7af0b7be34072e8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD532626983607e265640d016430f46e005
SHA1d9615cef7d60d3346b5c9a00c9c05b567891ab1f
SHA256522a28f24e5e0c5b3b13897217b64ba46e9d044ebf3638af6738ef7ac5fd4285
SHA512a10a9fa024a34dbd6d0b8b39db59980308cc6a543ea2693b31b28f25c1a10bc91d9ec0f08493d60cd6975e50c8159c0a1c3f2161b3cfcf46253640cba73a5d91
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e