Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:45
Static task
static1
Behavioral task
behavioral1
Sample
693003eddbe695d37d8f72bb218a0991_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
693003eddbe695d37d8f72bb218a0991_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
693003eddbe695d37d8f72bb218a0991_JaffaCakes118.html
-
Size
175KB
-
MD5
693003eddbe695d37d8f72bb218a0991
-
SHA1
d2a9cf488457694f23ea6f5641e3cf5b59cdc8e0
-
SHA256
35516c0258cd321fac2b9ded93124c60804076c51b070f2b4872a43ecdcdd0d9
-
SHA512
ae7e276ddd409d6b8c5b30a1ba484ccf1debe791d08fd2506e05e5c4643233c1ee83752a71b63556b3af27687e53542bc612baba9d7f7a878b8792bc64a02b0c
-
SSDEEP
1536:Sqt98gd8Wu8pI8Cd8hd8dQgbH//WoS3jGNkFkYfBCJiZn+aeTH+WK/Lf1/hpnVSV:S9CT3j/FRBCJiWB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 5048 msedge.exe 5048 msedge.exe 1892 msedge.exe 1892 msedge.exe 1204 identity_helper.exe 1204 identity_helper.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1892 wrote to memory of 1512 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1512 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 3008 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 5048 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 5048 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe PID 1892 wrote to memory of 1140 1892 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\693003eddbe695d37d8f72bb218a0991_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xdc,0x114,0x7ffdc2ac46f8,0x7ffdc2ac4708,0x7ffdc2ac47182⤵PID:1512
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3008
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1140
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:1584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:1600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4412
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5964 /prefetch:82⤵PID:3248
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:220
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4396 /prefetch:12⤵PID:5456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:5464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13837388584708688434,9150367092862143497,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD53a0c76316c2fd5780dffe603e5c1b136
SHA177dfb8aee8e25ec29ebf905815d97aed6cf48cee
SHA256822279fa679f717a509bff56a2e6ff22c11131b652a68e8baae909278ad8a31a
SHA51262674c6997e137132c6cfce6a1895b3c9ec2e24aa121e986709513c89449354634534d7d1422813cb42f699e3f2b58d9e0f84533356faf1e0fde81faab33685a
-
Filesize
2KB
MD5ccc44eed34a217ab18d233f08819a140
SHA1b60ce71597bbf2f4b9a0a694f3979ed6e320fff6
SHA25679c628f8c33e241fab532213970e0452efa44baff3e85a25b44ff70e03482c1b
SHA512e65e5a2dc66c120f123db84bf64de8ef4e8e1e55fbe682ea5f541ca738d3f9fc7f78deaa7e0055514d6ee1f20812eda74527602961a1fdc6721ea50bc1624157
-
Filesize
2KB
MD5b09d70b583b924254e66187a1483870a
SHA1893f0a6453495233887269b44ad098a903a009e2
SHA256ac007eb0035e91e0d72d1f58f9746a7befb0cd4693fb783cbd7219e4ef8097e7
SHA51209ce945012b62819df41ede1c07cf5f6281e48aacdcfc0ef4e90223b6dbe95a9206a313f85c66aee9db752c90dcda1d2919b7fd41f58db5e438f427e9ac6a268
-
Filesize
5KB
MD5a95289b72728da79fab3fbeb6249ba12
SHA11d5e57eaf31615cf54b1e01749b820c4cef826b2
SHA256ccd4f4a05f012f2f128c6a16f32a14eda0c47d8d10fb50940aa17c8dfd3efbd0
SHA512d0c917db89f9c31e57338bf7c52ce0daf2a87a886d286db9fac325ec17049b6bae1b9d0d912fad4bde67183f144f9a2c6af4d0f3dee1994fa5b3be9ccdde7253
-
Filesize
7KB
MD55bb5836db93852876e428a0e1e78ebbf
SHA1497320e6dbadf8d9d4e772a9cf6f6685c9c224f6
SHA25642fbc7de806fa580a6bb0f5cfbdad011fe54ca2c373f5dea99cea772cd35eadf
SHA5128e7e27a8f83f036095546e7d9f6f21441dbbfe2fbc87d84e5191e6e7b5f1dfade7008546af3e1a2bf453d78b918320544820db41d48fc5e5d0c99dcdb42f0f5c
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD58bb6033840fe2e671a3d70f50eafbafa
SHA19d7bb0d72e7ed8043aba81c4cdb1abfad830c2b8
SHA256dc641762688fd575a8f75d14ea25b14dd9622701c661d63af00cc7dc1f9696fc
SHA51269e4f43fd841d161207c3115c99525fdc08eb51420a31b07500b8a217452efe1878a280cdf2af18484269725c7386a308e609743f049ac60de5679103217e890
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e