Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
68b3263c63c478023910d3cad2f3e152_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
68b3263c63c478023910d3cad2f3e152_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68b3263c63c478023910d3cad2f3e152_JaffaCakes118.html
-
Size
175KB
-
MD5
68b3263c63c478023910d3cad2f3e152
-
SHA1
f8622abee53ad40f78265eea4259292da6f97955
-
SHA256
51b905779b9468b39dbd74add4fa622b6f4c1b3562bc7d260444b8ef0d7592cd
-
SHA512
d665c2517385f33301c0f38434e6ee93742f33486db29b6a5b83c402cddbc89b049b0c88d61f625a07125f6a5fcecca3fd9600b3bdbea04a79040d8f7d264b0f
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3JGNkF0YfBCJish+aeTH+WK/Lf1/hmnVSV:SOoT3J/FhBCJiFm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3252 msedge.exe 3252 msedge.exe 3656 msedge.exe 3656 msedge.exe 432 identity_helper.exe 432 identity_helper.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3656 wrote to memory of 452 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 452 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 4068 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3252 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3252 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe PID 3656 wrote to memory of 3440 3656 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68b3263c63c478023910d3cad2f3e152_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b3c846f8,0x7ff9b3c84708,0x7ff9b3c847182⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3440 /prefetch:82⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16841862984137373760,3136117066850971825,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\43660d8b-f106-409d-a29f-bda1b94f0b28.tmp
Filesize2KB
MD5c8396586f35aa60088cb18f3e1c765e8
SHA1b3e1bc22811d65fab24b933e78e48fddb9372dc8
SHA2568e40db13bdabe7919d16cfd8ba7b14ec6ac76061eb7cc973c19dfe87711958bb
SHA512391dca40d05d2ed243a06a2852f2ef28b5c600cd3458e973d46ce3ee093a719ecc1deec120d5eb7c4570d3ccad75b72f1cbd96e1562d5907d785fa9a85255d8b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5a4b0b5549dce1559217d94104c73af75
SHA1f2bd2f3ce5d4857e5a52ef401fe7c1ba248f11c4
SHA2565cae589181f78fbb7298fffc341b1795082a34b746317399957fd320c08c64ab
SHA512396574cabf1a099a91a06562145dab623adf02b246d1e8054e5aab8b8e8c01793d33b806d03994c2a1ccad119ce7293f55f011720ed7afb6f4f5f9d4b7d167e7
-
Filesize
2KB
MD51c451605577f29f4b1167278665a94e7
SHA1da1b0eef47b5d817197579a175936744d55411cb
SHA256eacab54a8510f54792c2131570a0053d936a24dcb92191a547945b55b973f1dd
SHA51264530bf39b62d644e6d19d05b462c508678b5225e4029860749fd9796d5cdb0e27ffd89f89289958018c20d92dd8628abb7decf657353e0a9fb25c1c748b7304
-
Filesize
5KB
MD51e5bafb221b0a5e8ca60bf65287f6225
SHA13d42b371cc37b32202f88caa9113c882900e24b8
SHA2565a89b1daff09b65b3a1131bacff4ba8aa941d9bd87bc65d19a1d18bdbea6fb35
SHA512cc7456ad5f4ac35a780bd2c1978b7f526a81921957dfb9b293cd0d517747ddceb51b5119cc34f4d73bf5bdeb0ec80ef9c8e150d5111947b2d3ba3aa1be74065b
-
Filesize
7KB
MD5fb8476a4ca4ae429d9b8ef7a1d05713b
SHA1eb250dda285734e257d13e83feaa2363f3ae27a0
SHA256118c2dec6f01c15afceea5852d369c739ea3dcd409f58fd4224b26642ef1b8b3
SHA5126e8974d84e714412a67288e36b17855bf307e32db024ecb8633cfda54b2642cb6cda89d1231f059b0849dbd76e9bcd9e3d8b0e1b4823354f42ea2129126b9b64
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD565a262a2232b5729619db28f8a77e778
SHA172467497d2a8343574c884a61d78a396c5144989
SHA256174f555048f51e65e13583ea6eaa6c9cd1cf83bde1f99fc640b5ee3d80339ea1
SHA512241f94baa80dc7e820813418aa36f3f3b894f8b8b0c35134ed3369f98294cd4a723b3752500cf529e0860b890917da5d0f85b85b026acac265fddd38a409f522
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e