Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:18
Static task
static1
Behavioral task
behavioral1
Sample
696bbb848a46749b66e6219c6a80b708_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
696bbb848a46749b66e6219c6a80b708_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
696bbb848a46749b66e6219c6a80b708_JaffaCakes118.html
-
Size
175KB
-
MD5
696bbb848a46749b66e6219c6a80b708
-
SHA1
ae96db886f87bfd5a553a81fd34406a5595163f0
-
SHA256
8c5bf8b32263377e88b04535d9211810c0b6699eaedab20efbc80973ad58d1ec
-
SHA512
59e064e3fd3a926129f06b014d2b9d9ff4bf77b87aea2ca5229dcb64394a4b505d349b5deee5ed8670e73f2b73ce4e49c5b20a2b4f427dbcb8fccf74041fa6de
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3AGNkFQYfBCJisR+aeTH+WK/Lf1/hmnVSV:SOoT3A/FFBCJiVm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1420 msedge.exe 1420 msedge.exe 3252 msedge.exe 3252 msedge.exe 4468 identity_helper.exe 4468 identity_helper.exe 6100 msedge.exe 6100 msedge.exe 6100 msedge.exe 6100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3252 wrote to memory of 2004 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 2004 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 4416 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 1420 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 1420 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe PID 3252 wrote to memory of 3356 3252 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\696bbb848a46749b66e6219c6a80b708_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f40f46f8,0x7ff8f40f4708,0x7ff8f40f47182⤵PID:2004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3356
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:5072
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4704
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:3680
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:2140
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:4048
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:3892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:2376
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:5240
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:5248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,12575680921724718773,10505256309249582476,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5b0880ed22c18ff37d8f2fb529afe6aa4
SHA1277ca4410bf7ed7c572227de736f473fc3119ec4
SHA25683841a9b7ae480113ae291e36388be8d839524d66d524608b0a822438624dc95
SHA512b487b1d0ba7fb14e938b5934b7916ec96f55a5e7fb9696704ca49692871ccd33b99f1846ab8f0bcf22b4fc278f807f73f11950fa544040d771d5badaa2b8fc1d
-
Filesize
2KB
MD5f854823cfd0fdbd70e5ec7bf8540006b
SHA1aa278b6fadddcf87d4007ee57a59b7cfff885053
SHA256ffedc1fc5fd3695304fb12f731ebd86c6e6668a8f0e47e38c96ae50862b1b3ae
SHA512761e3a7227910b159fb1378b01a0dc8b5ff38f851e0b5d241eeaa500d06fc843360dc6ff58785faea712d3d4a87340ccef6a47cde0cdafcf8f0eac945364c4d0
-
Filesize
2KB
MD593b59619703176da7196bb5a0e1043e5
SHA119a4adc5468a9b3b036384722cc7339fef1714ca
SHA2560a727ab915c2004caccde0e1c2ca99488edfbea21be3f5c3490e5b5dc7442ff9
SHA5124ee0eb98f7fa635b5ad3172822e7d47e98fa341c893797aba89f5543779e586297b739100513571077386423a5aa4c32b8a45a2085879e91a8f1271f252b035f
-
Filesize
7KB
MD507c6685b67013395a1168400f498e957
SHA1a54fa57c5b474af224d43028b5b8dc713226646b
SHA256c0d46c7bdd53aada36fd4b460bf9750b6a6777cc711a0c5fddc63df606628f3c
SHA5129850ccdf896ffa7ac6b264b12b0150bbd772d47edd00de4b68beb64920b87315aa2a5dd87dd623d4e1498b5f724525a788b2f5cfec4e776c22ee9b8565e35579
-
Filesize
5KB
MD5fc6ace6361e260ba0b445da844a85e1f
SHA1161b4a167cd80e2179b81b5d5e00e5f38c4bea95
SHA256a27b86eaca52ec3402e98287fa11ef65cf9298177764c02af9de7c415664e841
SHA5123489b6b4dfcba5d1fac5b979315a1702d85133bdc3440d86c715427c8cc517958d891dbe85a2be03615e2c34208457b870d625f99dc706efcb7bc9b87f392edb
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5edb5b44ddbb8771feadc80d326073c1a
SHA1179316dbf089c339db2365f5f1252c84e39c1038
SHA256103deec7576f66acb94c40097b965e01a7f82b47e009342a3e9d6c0e8b3cbfc6
SHA51213d70d89ca0fdbcbe4c35b786aef8fbd0993ecbf2f2e5833277cdadfd0a395fa685231bf3d72a6a04373051b4ab7b423fae19f56f58cfbcc9288e65494e9c222
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e