Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 20:25
Static task
static1
Behavioral task
behavioral1
Sample
3bec45f5b4870a092b4c6eb595dd8b0a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3bec45f5b4870a092b4c6eb595dd8b0a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3bec45f5b4870a092b4c6eb595dd8b0a_JaffaCakes118.html
-
Size
43KB
-
MD5
3bec45f5b4870a092b4c6eb595dd8b0a
-
SHA1
32ca0f3a5367c26fef6fc6b4f3d71f459a75fe83
-
SHA256
ff9e5322383ad0a7f070dfa9ce371491a570d4cf3d3a4827d0f671afd1655d02
-
SHA512
c1fdb9523e5b70982aa998aae73c00b1560ece24fe6ade2b0b44a4a4a9493580faa3fd989499ac30681d78585e6397ccde1ae9a0b41e17b26171adcb22be548d
-
SSDEEP
768:k5MMlgmZmxf5hiAO5Sb/odVhiCBh41oYeVeRevevoEWMOwjAmRrtdrVmvGyibPBJ:k5MMlgmZmxf5NmA/oLhiCBh4aPgUWvoW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 4904 msedge.exe 4904 msedge.exe 3568 identity_helper.exe 3568 identity_helper.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4904 wrote to memory of 2980 4904 msedge.exe 82 PID 4904 wrote to memory of 2980 4904 msedge.exe 82 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 3320 4904 msedge.exe 83 PID 4904 wrote to memory of 2676 4904 msedge.exe 84 PID 4904 wrote to memory of 2676 4904 msedge.exe 84 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85 PID 4904 wrote to memory of 5796 4904 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3bec45f5b4870a092b4c6eb595dd8b0a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc634b46f8,0x7ffc634b4708,0x7ffc634b47182⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,13147962173308649829,2098422734640476540,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,13147962173308649829,2098422734640476540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,13147962173308649829,2098422734640476540,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13147962173308649829,2098422734640476540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13147962173308649829,2098422734640476540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13147962173308649829,2098422734640476540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13147962173308649829,2098422734640476540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,13147962173308649829,2098422734640476540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,13147962173308649829,2098422734640476540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13147962173308649829,2098422734640476540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13147962173308649829,2098422734640476540,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13147962173308649829,2098422734640476540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13147962173308649829,2098422734640476540,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,13147962173308649829,2098422734640476540,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5220 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD56217c6c7850ac900d01483a99df2f830
SHA1d3d7a95cff176462389ae09077b2d81ef8288b14
SHA256bb455399bab11f5ec7471854686c529a13ef692571799dfc308080ddfe751b5b
SHA512b80ad9b024dbfef1e30c22f92f5be06af5b9efc1c20101476deafbd0927463773196dea8cd1fd4a2915d88562fd4ee560835786e7554c80f8ac8b655aa6ea759
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD52110d653a1a2a1c3556c58928003e2cc
SHA1c2e6ee56fe7d28fbbcf8c8ebae83ffc7a38f55f4
SHA25655336f1ae07743996af270f7e5686803563b693428dd4854202215aa9bc2703f
SHA512bfeb0f6bcde2c76273370dd63dad3fbc34a606293b6220858913fd4dc16b7f36f6dd1fba77546ed28602f53383054d0e7dab09268de2ca7c9d712be7b776ae38
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1KB
MD5dd1768a2e457e20be467ed2aa273b120
SHA1c0490b034ad208b50da3b9b3eb5f8e84ee68d4f6
SHA256f782557e6c98771418ae3e2e307ab2627051dcdc1445e393f85b77645644140f
SHA5124763d05c2f01f972edbdfe6c17c87e5d7333ac31406872335687bba9429fae6f593d4be4d0350512e9a0d601a01996327170d426c1832ea4bb88bf39f3a73a5a
-
Filesize
5KB
MD5075da95d4c06fa888e3c0cfd3ef4e5c9
SHA198cab7a15fede6a3500efe6b9c929a64815e1e8e
SHA256d262a0a3aa81c1177b083ed41b0dcd8c42dad2b080f8b5d23cb9e9461fc94b04
SHA5129d691e3243adb2498608d74caae94f233283e43f23d1349658c39dbb0a22d53803011b538c691b56d779510f13fb3e5484c981a11efcc11fb2e388ebcaff5bda
-
Filesize
6KB
MD5c1eb0983da861d37ddb18391f6617392
SHA133cc3a9575dcf363ca909dca5100ef60e2690ea7
SHA256f5fc10279f7095d2e643b6ca256f523cf8e3196c7c4956092fca3db32ddbb4a2
SHA512e57727378ce01e65bb2dfee38fda84269b503cdea21be13451fcf01c53bfc4900dda3da2240f2282f33fe862b7962ad90fd842212fd3d9cfe6f00cf21d53994c
-
Filesize
6KB
MD5977dc74e27e582e706e20c8b9223c2e4
SHA12a7bce523e333b997e670408da1ae367535b9621
SHA256c5a3f0ae38b4b91901645b1ba1cd58534985ecee12cbd98932588c47da061a3e
SHA512b70db81833f00d0087412fc3e0951e9ba0ab30f53fec5451b50cb414e630142ac342c1d9804f910df0451b3d049bd19b03153c9d92f497197e84aff646413f6d
-
Filesize
7KB
MD50ef24497af7a93d0f4789212288dd68f
SHA1580918cbe655513b469dbc5428e3d80f94578a00
SHA256b4c2e4ab6ee9f73fd84e29fc065fa8b29ca42b907864bbaadcd61b582f74c156
SHA512f613ac0754db0c97cd22c3b98e98a667c20fc887c05776b39205bb255bc4f30eb99669eb6fc788ecef9708e118ca896690c67bd796a4b67739d8be27e389c4d4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e53d8d83cc52fff1f12ff68c44bf15d8
SHA1997a950b6096d9d55d04043905a4200c5d750e70
SHA2564d1eb775b022c8e84e686b4406f8a34002924d4973a40262ca3c368acdfebd03
SHA512422e5da0a23975676d26416fb720b2e249968589821bb488be15a6325257904ccc526ea5d3a1eee236fdf1204af07f4892b2d65848fbc12b17380e471bb4b8e1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e