Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 15:31
Static task
static1
Behavioral task
behavioral1
Sample
63cb42e9c30358fe7f596b4e877abe23_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
63cb42e9c30358fe7f596b4e877abe23_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63cb42e9c30358fe7f596b4e877abe23_JaffaCakes118.html
-
Size
64KB
-
MD5
63cb42e9c30358fe7f596b4e877abe23
-
SHA1
c8855d64a6a2a91e6047f86f7b852ad3bb84507d
-
SHA256
26f6a16d94ee5251a42b85eea77109613d0cf5f7638822dcb68ff5893613c79f
-
SHA512
3e855463a9b323067507dabf0b474e710dd71fba0998d17cd7ce5c2d88e37cb1e09aa583b8cc2b382e2af3ff4c1903530f223239474a11ac66d31414ba031780
-
SSDEEP
1536:5jwpD322ifsAZwoA3+wiZicGb1jKCYClC:5jwpD325fBGb1jLYClC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1928 msedge.exe 1928 msedge.exe 4012 msedge.exe 4012 msedge.exe 4160 identity_helper.exe 4160 identity_helper.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4012 wrote to memory of 1696 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 1696 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 4808 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 1928 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 1928 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe PID 4012 wrote to memory of 2064 4012 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63cb42e9c30358fe7f596b4e877abe23_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1b9846f8,0x7fff1b984708,0x7fff1b9847182⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,351319773268122252,12800891894840650566,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5bac829c7b60707e38b6c8c2c5ef78c8a
SHA1a2f986574c17a470e31698eb85456ce4f7fde197
SHA256e31f92d90cb9f361025dd80a3d7fdf6a1922826bcab16b18ec59875b6ea948bc
SHA512500d4255509da3704787c503b5202ad162940f74c8beaaebe3e33d3e104ed15daec7696c5ca4a2fdcb763b9aef43d91f1880f832e3f1a813b4067cab06573dad
-
Filesize
3KB
MD5d66aa8d5a99ad149608b8b17d78e3cb0
SHA1fff5ed558dac259e46781a868d673e7f60f20446
SHA2561b9be469742e13f8de9aedd72bd668f764b98d04cbd0bcf1e4fbf9775712d6b8
SHA512f47b73fa2cf08c75ca1a61de905713fc948e2c8109f35921643b1ddc300a2b50059e9f033c431fe5120c1207edb7a8fcc6a920cf655bccdd1843c45424538529
-
Filesize
3KB
MD58fcaef35614f8abaa5d2157c02ee3eba
SHA12bd015e335054418e4d58b5ea543d3b4d896f459
SHA2569f129856085b3825557779e49b23a70d296158911f0d0d195e37cae15644721c
SHA51293deab5531883b5bafb29e9fe49cd3366b265f294a7b8aabd3fed7967387b68c8224be9e4584a9e0d1faeecedf4b820a1edfe2f5d66ddfaaeab9015fdfd7c7ed
-
Filesize
5KB
MD5cf582434394ec1ee08373e330d7cebe3
SHA1db3c441055ce0ac12ed8c353e1533f937bc8d153
SHA256c19422e7eebdf2efafeeeb6b4d989b15348935e396b9a918fda1f4733869942f
SHA5128659d2d4d5c292712760c19fe1d810df721c4628b85e3e724b30592b98e1d056c66ff6ebbc1049bce331723103c68a04d69ca54847601ad8c7c95af07aebb279
-
Filesize
7KB
MD5fc8e30c82d00ce71e58dba8ed84a9a62
SHA1576e11df7b92a75767ee44ffac58265229e6f9c4
SHA2564b981a80d0f3d9797633c6a8cf81c35da5d2d1fd7115712be3c40f79028278ad
SHA512a9e762ba3e36e6cc99ff0d3028624c4b85ecfee652bc36d6a1119def6a6b7df496941ee88cdda350023daaeaa81c82dc4146a5319ea2fbaaf7747fdfb8c74078
-
Filesize
7KB
MD5430eb931b1b6b2dbe4485f3e00a0fa7e
SHA1c13da23f7d8508d49d2a2d7043c50756642ec878
SHA2566b4ab26cecc324f137ea12985eec1811741679c444d5fb7e4a3fb00a7e233ef8
SHA512a26e219dd85f39d6b08355c018ce30385809d72d36930d8782b0a10b02e9ad48cac8bcb4ff44a12538d8e097e6a84cee491c5d87f1d8a70930c45608b2ba4481
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD594e1ab3661cdb169c6909cbc8c3174b0
SHA1b36333b1fcb08355a1f78d959944733de7d82a0a
SHA2563efb14cba37e6d46700faa34a547b71bead6e4321c0ae7403f62e9779e9c3455
SHA51239e1e49286ebb0917b688913c105f3f4af166fc7e62df613be8def571dc1e08b2870602398896480cabf1c807d96ddec7878bf27652e9c30e4c5e6c687081b6f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e