Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:54
Static task
static1
Behavioral task
behavioral1
Sample
68994e7825086a5ad45d55ea71d1b4d2_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
68994e7825086a5ad45d55ea71d1b4d2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68994e7825086a5ad45d55ea71d1b4d2_JaffaCakes118.html
-
Size
161KB
-
MD5
68994e7825086a5ad45d55ea71d1b4d2
-
SHA1
3680a19e32922e3b3c918dc236e287981598ae49
-
SHA256
9a795e141d0bfc18c7b2e51166af32f3d1178d41d2e3d73959906a707422d3c9
-
SHA512
4768e8f7c19c1e28dfd1ea9d679a36eeaab849a15d3fbf1071837626b32127571ef78814d87ce0c711266d06872f49914131d80ffaf5020403c7d891f5d9a61a
-
SSDEEP
1536:U3SftM9XztQs42cJEzrujJHecvLe+RTC2vXRsgX6KMtXPN:S38EPu8chTWgqKMtXPN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 60 msedge.exe 60 msedge.exe 1020 msedge.exe 1020 msedge.exe 1532 identity_helper.exe 1532 identity_helper.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1020 wrote to memory of 4820 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4820 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 4832 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 60 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 60 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe PID 1020 wrote to memory of 2960 1020 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68994e7825086a5ad45d55ea71d1b4d2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff99546f8,0x7ffff9954708,0x7ffff99547182⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2532 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3364 /prefetch:82⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1836,4043955557708617655,18304455877561436377,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD57c45868438d23278bec0edac3c5f61bb
SHA1c7bc8add435b138e9adb1c752d9cf9c4c0dbb234
SHA256b2894b28acf3db5bb45afa05b85450fe341de50e6249a6b7b1cd0796efc1ed8f
SHA5127ff1e38650dff0d715bbae6d75e8da5742d7fe3cdf08487fa9670dfa0f6a3c2b0614c0c6d7c10bb95a268f529479a1fc06c6c65c24bfe8ecd490a844cde96bfe
-
Filesize
1KB
MD58eed93b0f851c5174ae4fb400ddb835e
SHA134a44b9edabae6bcad741329a1d96b76edf33341
SHA25688a385bee7e8f328154f66d45cac7d95f68cee6cc71837477ee07610d3913027
SHA512f75c961c6325aa21a85bc27370a026ab19248114a31eb394fa70f1e3fd095cf71be963c2e5e7119d194f35c68ca14f35415416feb5ab520b972c5fa57b680393
-
Filesize
5KB
MD51843f202cdc1dfee472ccd38ecc2abc7
SHA1f332b0007be7126f80bf7cd4790b1644c13683e0
SHA2566cc9633b3ec598e1f0b95c127e0a24349a82e827fbecc1687296f2a3a9c60796
SHA5124c90c7e26fee3141f995c0422ab739ae249f160934874b8b37b987690b06dc46f185ef5ce6acf42f97ae52a36a1ff09a846e6a7003e7b42298393d70d4422dc0
-
Filesize
6KB
MD5f8129b437973a64b82e6d89a3abe86ea
SHA1e48e0a556a6cfc9d42eb71a363a120d9d56a9718
SHA25637df5d6e30ef20f99cdcd119620c5f229f490b9371be09775014e15ee40d7a4c
SHA512dc317937ddf48364caff7d682d25f06642819c0f24ee30e761d00e73f54846e906cc31cdd3760e88358a5c8b43be1c784977081d765c148040225da030543797
-
Filesize
6KB
MD5d76ab517fe91a3e821bd91a69254ffe2
SHA16c313f4ecc48306afa7cea18b3af72204380034d
SHA2561ac6902edb3fadd1e16c093b84edd55cccfc349cbb4c7f02cbe64c8ee2fc72cb
SHA512b7f09e9659280cbde6e15bb0a4e71d69a7dc9285ac789ea02d6993bd316bbecfabb619a7757a7605f8f9bfcd49013451dd5d8e855f9bf1936f6d729c8b3a8462
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD504749cbc04230cb732c4f79529941c98
SHA1e651d21ddd270256d1e1bbeda89210dd2044cd91
SHA25631ea605bfa0f3d5d710347ad5cc90c4682623ef87253dbd66d57a3d6e4992a07
SHA512459743eeddcca28036e97ca47029dc82cb9729e8f9d256ea04f89eb436efe34b3f41e7b0644ec1d6bab4f25c673573b663cc94480da2305b5162e413fae6c88f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e