Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 15:30
Static task
static1
Behavioral task
behavioral1
Sample
2fcd0d42b3a66667773d6ce91c1a4d2f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2fcd0d42b3a66667773d6ce91c1a4d2f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2fcd0d42b3a66667773d6ce91c1a4d2f_JaffaCakes118.html
-
Size
126KB
-
MD5
2fcd0d42b3a66667773d6ce91c1a4d2f
-
SHA1
fbf787bb2573f4b138c16905b9626a7d2fdb4d8d
-
SHA256
fad6f7e3f530b042f710e5540c8b2e4244b9c2e665f0a7a99402472b9eef85fd
-
SHA512
c784251b293eb0a01be61a11bb4910173731e70c62344ac4b08ecf35b042ec92c8feba0fe1eafd94a13185c75cb012979bd107ab43b38a9fc89a62852a0e63a6
-
SSDEEP
3072:DWiQW3p6pOdPGn4pfTuluNLzGwOGCW+6z4+b5SEitRtDS:KiQW3p6pOdxzGGCobL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4832 msedge.exe 4832 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 5056 identity_helper.exe 5056 identity_helper.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1636 wrote to memory of 1260 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 1260 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4580 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4832 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 4832 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe PID 1636 wrote to memory of 2960 1636 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2fcd0d42b3a66667773d6ce91c1a4d2f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbb1b46f8,0x7ffbbb1b4708,0x7ffbbb1b47182⤵PID:1260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,1611355924146265038,17536282405079846841,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4580
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,1611355924146265038,17536282405079846841,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,1611355924146265038,17536282405079846841,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:2960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1611355924146265038,17536282405079846841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1611355924146265038,17536282405079846841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1611355924146265038,17536282405079846841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2148 /prefetch:12⤵PID:1932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1611355924146265038,17536282405079846841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:1628
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1611355924146265038,17536282405079846841,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵PID:1116
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1611355924146265038,17536282405079846841,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1611355924146265038,17536282405079846841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:2480
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1611355924146265038,17536282405079846841,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:3920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1611355924146265038,17536282405079846841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:2160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1611355924146265038,17536282405079846841,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2768 /prefetch:12⤵PID:1368
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,1611355924146265038,17536282405079846841,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5320 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5e8d9ccd526fdc77477b24ab1139c8e7d
SHA168cf2f1c200a6b9a12a3806ddfb27d832e72819b
SHA256326b93077bc8a0b4333ba55e170021f504cb1816e2a2cd16621f0fd03b60d4e5
SHA51260a18134e93ff2ed7e1c95a8a4e84077ad1ce47c3e3bdbace8d8e5c0ab80e967910c95f90c2af3ac9c691cbfa865ad9150a774d34f251b1678fcca9e2d1b7032
-
Filesize
1KB
MD52a9f1332c8001276ae48596c2773c69d
SHA18bcdb4d71826be1edf68d34033048db0f1ccaaa1
SHA2568b405338c5bc0dccd98377251c08c54e6535f667315feb73adb34e4f91e17af6
SHA5128fcac55674dc3ad403d22f89a4d0c273a40f759f898e21fa0f990f88d2c78f017f3625a82a3dfc72a39892e00fba11c4698847e2f19c98792fd7edec6f891621
-
Filesize
1KB
MD59989b2d3455b81e49b92fe76b6482ec0
SHA156f9b0c2dd6d25359a080fb6f3ab1cabeb383af2
SHA2565b715e13f5c185fe0957d65f72fec3efc101f37af29f9ffa3cc7bad9fee206a9
SHA512aa0d187061e116d64269651998b8e3e04211fd10518bcce2ec34d60d4d7986a5edf0b4a06248e3a0682b60685c7521d59674770445156958634dd187346adaac
-
Filesize
5KB
MD5dd1650d1a8d2b0dc78a35aa312e51b61
SHA1cf489c58a486ddd44d41795b701ebb5db1f95e6f
SHA25637476d280596be8f8d21bc666aab1a23d7e53bf2fb1dec6eae0138e37c4f071d
SHA5125f26ab7da612a503bd6a0d9dcdb1241969a4dcc5789ceb471d14570a99f89597af819eb1ef3ac29ee8a22e667c72a1da7fffa5cccf440379854f42526a101864
-
Filesize
7KB
MD5d21c05063456a0a668af3f7cf1e140eb
SHA19701b33dd111643363d8024653c259d970fddcb3
SHA256932f91d593b0825995004148612acd3d42f2dc6aaa245f28f7ae7c95cd0c2aa6
SHA51268320ae920205c50656e95473f4e4edd3af35f4039646554e3167b5f98209b3c65ec5fe19c0061a0b1af1e7afd4f3d637ad1fa58075033d3a312b2ef545b32dd
-
Filesize
6KB
MD5f061f33808744af35f3adcb88cafdb04
SHA133da11539095e394717b89be9a7265f46ada7fbe
SHA2562d726b0944286f49db760bbbe68b1e35e45269ec3dff894aa27fd7137e749b34
SHA5124dff9d66cf161acc800c162fcad10818ae0f14343ce99bbca8a8046753c2546c19e74c19572d7dff51683873849c1b9eba22389d5fef896f60a6f6b21951e8e5
-
Filesize
538B
MD5c7ad5936677ea24b19569de3df56273c
SHA19cc9b6342dc5c25d9885b60d6a9176f0f6727077
SHA256f21d73f23b88c4b35416b040de7a7757b0897fc1f61a6e6d717604f96cd35c47
SHA512c36ffb31bdaba333346abe9e2be2842f214f6fec50da0b93aa950d1973602c57f9ff77616d593e5ad93887fa2547d299ca9c3c39ac55968ed989eabeefab350b
-
Filesize
203B
MD55b3a74614665603bb39b7a1e61e9f8f8
SHA136fec1c087befc53ab5d641bb23e34b1ca9fe4ef
SHA25648e0e4c6da045e8aad4fe5c867461e2f11c8ab1131c7a7bf14fdda32de182d29
SHA5126a72088e454a490eb0d1ad7d649746bbcbc0741d771a2e1d64fd5a3baf2fcb0394d50f5f53d3ac7a6af20e869884530735e11ce9872814a5068f486a57988a19
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a957f9913122befcc4e81c897764d652
SHA1de6565aadc002e7bfb89a9ac181e4ea60d4261bf
SHA2563d0d6ebb823efc0d937078bd9ce72e07f88df1f90b217bffdb16899eff19c2e1
SHA5125321cbc9be41845a1d7c14dcf602c78ba55be1842534cb4a6b327411729be285b8ee45f9675bdf528eb9e3759f9bf5787208baf0e503e7d354d21ca01db48d0e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e