Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
63bbf3564ba6be813048c1d76a785375_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63bbf3564ba6be813048c1d76a785375_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63bbf3564ba6be813048c1d76a785375_JaffaCakes118.html
-
Size
175KB
-
MD5
63bbf3564ba6be813048c1d76a785375
-
SHA1
b2f7a5da8afab3afbf65a17ee59c2e60d8bc299e
-
SHA256
0b148c51d1051923f24a1ff140ced7969fb0cb129e95a2ebd120b6d445d8c731
-
SHA512
32adfbce426943c03921087f83e34e6cacefff22cb103ba8a5f9b732431d99c82c9d8f115f6270ca396381d2fa9ef64cbe418eb501b98e00ba90f0c9fc457ea1
-
SSDEEP
1536:SqtK8hd8Wu8pI8Cd8hd8dQg0H//3oS3VGNkFlYfBCJisH+aeTH+WK/Lf1/hmnVSV:SpoT3V/FQBCJirm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 724 msedge.exe 724 msedge.exe 4340 msedge.exe 4340 msedge.exe 3904 identity_helper.exe 3904 identity_helper.exe 5996 msedge.exe 5996 msedge.exe 5996 msedge.exe 5996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4340 wrote to memory of 1760 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 1760 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3000 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 724 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 724 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe PID 4340 wrote to memory of 3068 4340 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63bbf3564ba6be813048c1d76a785375_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83e1046f8,0x7ff83e104708,0x7ff83e1047182⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3536 /prefetch:82⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,17736239151147741711,1950792047007938310,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD556abbba81c60cbf26c85bc270242bd85
SHA19fabd11ddab052cb5a0b269cda108276705a7792
SHA256c0a7efef468e10b514613c22daefce316b08e12c6ce0b346047c1938d0d25c99
SHA512c9fc8eba3303183f4fe0453a25bd56ed7557954e4f04b1ceec917603af5a80b624c88542d36537fc9a7d5a9c220e0e79c9b00a89ac493e81beb48feb1dc3afd6
-
Filesize
2KB
MD52523457588204471094f3799722b60b4
SHA12106be2a2ae9ffbc5e394a4a0074843f7e768bba
SHA256f05807aacddc6805862521a203ab918d6fb6ee911ef7a8a001f4a40bdd2bb930
SHA512535fae4914a411f38e95110d0854bd148f411821f0e2820261d678103b0add80e9ef8391f43a1e8fdb930814320a2c12ba20896498be8ac1654003c1897ad8cb
-
Filesize
2KB
MD52f82ca694c83c8e5149638733504026b
SHA12ccb32ba07d3cfa118e4c295fb3d6dd3d350ce78
SHA2564956fbce55418332dc98fa05d82722edcf795b44f0f598bf33f219800c3c2a71
SHA51209f390e389a237969a954c9ff791a88671f788018ba0fcaccbab9568ca0cfe056d37f41a9a2e8bb21ec13f8943afa6b44f3859b2e2bdeaff4ef863e1f01c67a2
-
Filesize
5KB
MD59b834fdcfc0f57b216b2628f8048e2c9
SHA1b58b69b9398db20d45e141535214a81810365ad1
SHA256d6a546466deab5b1983c6684fd417e3ca4b576389321f050df3ecab2da839a82
SHA512043dcebb036a556ef3442c721ceffcad908ebcdc824e03c2e098bc2d4a7bdbb1c811484e856a62c753ba67e999eecad3ac34ee89a263546b80c1062273e9e74f
-
Filesize
7KB
MD52a786caac2b305fc3fe7f9551c2166a1
SHA10beff1b000500d050f641d705389553f167c6444
SHA256c64ff4b3e5999fb146756932301c9860a7f6b3681847f3a33b4d8ab37fd52341
SHA512975d1ce1d0121ae8995117fd49a56101fada017c2823861844c7c2bd85ae87d3ac6dc33a250579be5b3fc1a3f7c3a8f1471ef569d8e33b5e8c31a7d62a25197c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD555bd8597bdcd10d90a0fd9a47e8ab76d
SHA1331c380836637d10b59f4ce7b6a227b7a34ba884
SHA2563f22877dc2898467624871f8082846b2377ffed04f7123fd0ea898d0fefb3e3e
SHA51280571bd1c9abbd969fff729f9c66b5b706b08dff7d687199e3ab2b775bab0be488d88c58ee68b5240548e5b49621ac1ec80475571baf1a0de020cd53336b1f0b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e