Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:47
Static task
static1
Behavioral task
behavioral1
Sample
690bf03669e33dabd6dd3ad9474a455f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
690bf03669e33dabd6dd3ad9474a455f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
690bf03669e33dabd6dd3ad9474a455f_JaffaCakes118.html
-
Size
22KB
-
MD5
690bf03669e33dabd6dd3ad9474a455f
-
SHA1
7a3bd105fea35782dcd9da3cdea5959c9cdaac96
-
SHA256
594d0e16b54da62a7eaae185ca7688854568da1797559acec5626c12d94a4cd9
-
SHA512
af56d3bf9a90d4045a53a7463fa9924b16cdce787a4766751267ca0609ba01d4230bdd8af3efb344460418463d8174317b09eec5ecfd56c403610a498c73fb9c
-
SSDEEP
384:9XOUxJrFRdyyqSj2BSu5FkAMb13qzuzKfFpqi4u2NNDPHFthSHJQNQQcY:JOUxJrFRdyZSjwSU6AMB3qrfFgiV2bxL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4628 msedge.exe 4628 msedge.exe 1736 msedge.exe 1736 msedge.exe 4296 identity_helper.exe 4296 identity_helper.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1736 wrote to memory of 3988 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3988 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 3532 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 4628 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 4628 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe PID 1736 wrote to memory of 2320 1736 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\690bf03669e33dabd6dd3ad9474a455f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffefd5946f8,0x7ffefd594708,0x7ffefd5947182⤵PID:3988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10072408497668616835,16226138320615615734,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,10072408497668616835,16226138320615615734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,10072408497668616835,16226138320615615734,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10072408497668616835,16226138320615615734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10072408497668616835,16226138320615615734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10072408497668616835,16226138320615615734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:2176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10072408497668616835,16226138320615615734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:2452
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,10072408497668616835,16226138320615615734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:3352
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,10072408497668616835,16226138320615615734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10072408497668616835,16226138320615615734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4432
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10072408497668616835,16226138320615615734,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10072408497668616835,16226138320615615734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10072408497668616835,16226138320615615734,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1568
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10072408497668616835,16226138320615615734,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
488B
MD5df2a3d71082068a15b889ad894b14f25
SHA185b7ae26fe93ab03b600a64c88a66ad666991361
SHA256c01bcee6aec922b71e41fbe432717f7acbc3717ba09fcc6e147b2f21cb04f4b0
SHA512dcc88efe342717b2e9bc7b64ce51720bd7e667e1605078fc71424c84e83c383cc881c257e2d19c41f09be564e109e93e045086bc73cf928f72f4b79a035b4330
-
Filesize
6KB
MD582e24d6e3cd9db7c247accbdf386c65c
SHA1c1593948cb4539631622961d8e06af947b70a2c6
SHA256c7479cc1bdcd334eeeea5645b5c6159747def10b36488d0233944a6d27fc99fb
SHA5129bb7eba4e6babd682dc34a1a44125838ae6c0b92aada616c144487876751e30113f40525b3308d31cad7f625fbd9820fc8e0f2129a321932b4bc8769d9a561ab
-
Filesize
5KB
MD50338f0aa724d4c71621060e9b4779ca6
SHA14326c426310c0a45c6b9111dceb945db9084f468
SHA256d8df942eaa3be449f412828cd8072aea346800a59ecf374421bbfb0a0e54d6af
SHA512fb575f01e13002e249734e591542835f2d9a3c40bd48ece95bb87490fe24249406a5dc94f258e12c992ef2b41543463850cd645c465c7ab90f52d76beea69e85
-
Filesize
6KB
MD5b36386b44a3114abd7e0c4ebf91cf4c7
SHA13fc0e35fa60459e8ec5cba6d31f4c7ac1366bc5e
SHA256f429fde0091426fe3792849e284669a2f21bac1a849b6de0c16174ead242a3fa
SHA512dc3c41135d98affea48879e3bf74f64b63c4b3e10aeb21d2922e526f1600aac435cda31ee0ea07f17fe9a25256681190e9c018151537072bba8c543f52e3b509
-
Filesize
702B
MD56f2e2e50d783669931d4def214db1557
SHA182ccb1c34cbf2e22484fe1b95b92559049bf986e
SHA256e11b7c9141a0cab2b8e2df87dbce3c60d2cce45590482a6d2d64b9c9121d388e
SHA512f06db338e60b94b3a411beb519e16bc75231399ffa1aecc68861a0edc24a41c21ef1a651e334825da5a4f35a913088431357c95cd08abd217af15f07b36f3504
-
Filesize
203B
MD509b0bc3d6477cca551134631328b0c77
SHA10eb7315fcab1f0be2bbba02644150b62c239a7e2
SHA2569c49cdf229885ecd5d67808a113341918d82397c711871871b08b5349bdd82f8
SHA51218197fe3eb6af0adaad385e1d4d44f75b2e64eeb464a765a16bc0cf98f9987111668fe5be17ca1c04fa758c0e52e599f77a17ff7e550152f2b6063ed0beaa40b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD594c57904a4a61c1eace510cd42c6bf28
SHA1967ff3f28833769ba16ddaabde3870ddddf102d4
SHA2569be174e2558d41fe14cf58b08fd1082f2d75cc1f7a86ac18cf7cb7747bf8e5d9
SHA51268b1f27927c3d78e615932a8d2b264a920fb8b8a9e60cee6962220aa746e0cd263b3056ed29b5e225b92e167cf8ef540f5015f8eb3aef88c8ca7a12efa758182
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e