Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:36
Static task
static1
Behavioral task
behavioral1
Sample
690466260d9394f2ab98c102ed65996d_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
690466260d9394f2ab98c102ed65996d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
690466260d9394f2ab98c102ed65996d_JaffaCakes118.html
-
Size
175KB
-
MD5
690466260d9394f2ab98c102ed65996d
-
SHA1
bdacba1d27c2c0f0d61e9a0f7d1a4e57ea1afc22
-
SHA256
84dbe83346612e2788b0cf2e33d8178afda4701e1e77e6002d1181da32849657
-
SHA512
528002aa2823e34c250b65372d1e3af2f3e4fa8b10dc6d5fff0f8898795aab662402cc54f5dd843351462b9e8aa10a9a4727991e32a74c3e11e674077fa13749
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3wGNkFyYfBCJiZn+aeTH+WK/Lf1/hpnVSV:S9CT3w/FDBCJiOB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4612 msedge.exe 4612 msedge.exe 3480 msedge.exe 3480 msedge.exe 5100 identity_helper.exe 5100 identity_helper.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3480 wrote to memory of 4664 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4664 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1696 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4612 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4612 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4840 3480 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\690466260d9394f2ab98c102ed65996d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc65f46f8,0x7ffdc65f4708,0x7ffdc65f47182⤵PID:4664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:5080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:928
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:1520
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:3560
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:2784
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:5116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:2672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:5268
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:5276
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13811571007066904291,9627780628228011922,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5a05232136497a15e6d6794e79d9d7f7e
SHA1cce227ef35c757fb5f7c7adbc5a648830f052ab4
SHA256b0afeb3ebbd9b827cca69be7c5d283aeeee594d55191c70e21416057c4d8c2cd
SHA5129817765565df36cfee71fa7d1b7013dd5453e7bd8622d3745f6aeef881b7f1031103bd1e5074ff52063a6bb722afd38b006eefed218aef59911831f79eb5ee18
-
Filesize
2KB
MD53ab90880ae74db3038bf76ca0e775953
SHA1bf93cad58e02240bfb89db922583051a1b51ecaa
SHA256aa4ec1596884332978afc20a0c269b7130f76f7b6203803ae601989db23a19a7
SHA512722d81ebaa57062c928bc6222af157cef25a367ff4b13be8279d66283665a80014e60f052605f843ca5a6300194431b05e18d793538d95281c832ea0171c52a8
-
Filesize
2KB
MD5c642dae2a2a3620072e883337738b56b
SHA1acede88c0194f3143dd158225431a4cdaa7c986e
SHA2568725a80b93ff9cb01a6eb5d23f02a60dbe3491866e6daf9dfc787dddc7e549b6
SHA512c7765a72a8bd9d46a57386997cde3b7cf960164db08f38267049299daf7e0776e4d2ce169d1df0d02e606eebbded7af050600b261e3b0507ff2e478c0fe5d7bc
-
Filesize
7KB
MD54f5ead016dd66446eeb60aeaca566a06
SHA130e924b931553fb8f9ec2f2253d4bcc50dac0d01
SHA2562ccc56734d6c66605edfe38536657d25f04da1bf5227f7ae5ec792f0a418da82
SHA512cb6afe48bda80a38db47671a38cb7878cc8d13b28ef450ba8491176713be2b6e8d8d99da304d47edcce0c38445e6e7bd004e0fe430cdc41849bbcdebee1ed433
-
Filesize
5KB
MD5c133f8a5e5ce4e1250e14f698906a88b
SHA1e9a8ab4ac4f9a0004086bbc9d3d4299c9846e506
SHA2562e8ebb21d15cbef172cb6870f599d34b89bccb97c60cf2802e429125a3fed688
SHA512ad6fd7c6f2d90d381c00c50aa03452eb720c34f7edaff878bee4a33aa02bd23e3af17c79715f21573b363985a5dbae613b67e07dc0c5ea032f2cd3888f3d6d8c
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5ba3f62ca11fe685e83aab265d5478f29
SHA157b0dddfc1a96d4640f9fdc11e6268c83fc196a8
SHA256cccfdb9576e82a9601b0ba180f9d321675e7eba38a8e0e98f5b50fb4ff5cf219
SHA512ee7dae5097ad76fcdf2ec2b63de4b1b44a6f2dae4f726dc3b1d6b48911b3adcbf1f742eed44fdb77497b26cda52469a4fc692b9b9417838b3829b23361416ac7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e