Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
6917c99f9e8924bdee4251abb80724f8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6917c99f9e8924bdee4251abb80724f8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6917c99f9e8924bdee4251abb80724f8_JaffaCakes118.html
-
Size
45KB
-
MD5
6917c99f9e8924bdee4251abb80724f8
-
SHA1
1c2beeffdc4738379599308fa7dfa3b7a6adec8f
-
SHA256
a05d783043c5b153ba1829207f6a482b52ca56c013dfe49b7055c60287c8662d
-
SHA512
70ef89ddd1ad378c9fc60859ae67f2f16077a053a3694517cb56329711dabc04493b30a8a3a834f0b826cfb6367c13d124d56ab84d346842924a621d615936e2
-
SSDEEP
768:pHXHEHT1GVCTo0FGHt4mOL4FnVjufagqcPQRvMMoaZF2Sy9O:pHXHEHT17To0FGHtNAfa2zMoaZt
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1244 msedge.exe 1244 msedge.exe 2108 msedge.exe 2108 msedge.exe 4888 identity_helper.exe 4888 identity_helper.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2108 wrote to memory of 2620 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 2620 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1864 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1244 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 1244 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe PID 2108 wrote to memory of 4420 2108 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6917c99f9e8924bdee4251abb80724f8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fe9b46f8,0x7ff8fe9b4708,0x7ff8fe9b47182⤵PID:2620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,4949506433208591383,12549103820789702417,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,4949506433208591383,12549103820789702417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,4949506433208591383,12549103820789702417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:4420
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4949506433208591383,12549103820789702417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4480
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4949506433208591383,12549103820789702417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4949506433208591383,12549103820789702417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:2376
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,4949506433208591383,12549103820789702417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1432 /prefetch:82⤵PID:4460
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,4949506433208591383,12549103820789702417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4949506433208591383,12549103820789702417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:2680
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4949506433208591383,12549103820789702417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:3384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4949506433208591383,12549103820789702417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4949506433208591383,12549103820789702417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4796
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,4949506433208591383,12549103820789702417,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5480 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5640b9b70f7a041668650de623a60f155
SHA15cf485996d32c4b4fe62f548a6c7670fac48e918
SHA2567d9dd92c548dd6953439244c3b5c5bdcb7085a6d2ed23deb4a8e8ae428c6ffd9
SHA5120c72b8255761d249586fb06e753f774907bf8e9ae72023f78d0e68015f74e64f064b5b2335f6a24694f5661034c7652f5d36a3ec23cc179f0be383a07e5ff963
-
Filesize
2KB
MD53c8e57101f42e0172646e3fc40f50502
SHA1fca6829c38f4e7a23d39d51e8979c72abc82d5fd
SHA2562d239d13f881d23a793a364fd0ae97c19dedc222957b1488769c50c29f74f2e8
SHA5129399f5df3f000941582608edfae774282a4c9bcdf8b68566b8aaceafb5c9b5f56bb8d908f20e3a1240c84a10888caace402727fbfc09881e45997a384137d8de
-
Filesize
5KB
MD55e34b135dc7604542ee0a3c4b3e1a246
SHA1c5077716cc96556d91dee145aca5aab5c45d7c93
SHA256bf408437bb8f47a766dccca110aac00cbb06cff788b559897f4411354ab45cbf
SHA512e4063f9be0181b37bf4d664e33c08e3c9662e9915130d2569c8e939f79454b1ffd8648e5c6b31bdf08a2baf3826ed09fab30ae0b7955f75dcd25c22516600afa
-
Filesize
6KB
MD5098ac8f2b96a459464c18178bbac4ef9
SHA1da53b294c9161734de8d2704d317aad5e878e215
SHA2565b0960b793617d169af0e39904bdc1ea47f94d2e870a3f3cefe59d4938b53073
SHA5126fdab12e8d742c36cc430fe3a273f0e7909d183ff4b6589cb96fd126614675c5a23dc18fb9c3cfb5b50b302ea301e4dcf086343aa31e21ad9b5227240388695e
-
Filesize
6KB
MD508e463ca3a837af70b6c6fcf36a992ac
SHA11be3bedf121aa6edf88681bb73466d7b33285686
SHA2562a97297f514aea1d28425634e0102542c90beba80257d00ffdfa958d7f92c46a
SHA51238a68b3a123c2235b9732e1fdfbf2105058e76f5de8df3d3aa6ecc20bf20c8c3a1205bff395d82661fa3cd722ec64bd4eec74df8418644ce6902e606450c61a0
-
Filesize
203B
MD53dc9162b1fa88953e5d2361df5694c05
SHA1c76ea2bab91323d180835188003b8869363d74ea
SHA2563277d121162e43f2e9fc13e793890d7cff99188be4a7ed9142eceb58373673c7
SHA512666f85c95e04246f4d769df1ba8d5c0738a4d06f96fd11456f1631d1797d994332fe7729a140ae633044e77fe2911a74255f53c3583a786f6e6942a7e143e5ca
-
Filesize
203B
MD5668b4180c5921ccb2f8717c24e6efb2e
SHA195963b217a6db87ad3fb76acffe349a34277917d
SHA256fbf2da67b4389d1b48c50be928f1b6119937670ec98cdc023bc47fc7e70a1af6
SHA512e25544ded440be4bce9a40de705f5bf356a37046bb6d1ba44f2b65c3f62ab614a8c9772181174f0b5012ce01a45d79dc9231784769a126e9bd694660847b18db
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a2dd22e20a6311a9fb9b7d062054341a
SHA17193923baca1ce8eea60f3d1accc5726998050b2
SHA256c7b42902c94e58c13e93cab0e63443311d152cfa7bf4c6a5e73cdd9ae3c40f75
SHA51233db4af7bf8729525776869f27f7caf37af4b22d07d044432d8b87811711be31d5128f3ad94e1355ef496c3aa5312e46e25eb62e0e715e69a6da3a307556a18b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e