Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
659da9e9d198984fa4c1082d49bb32bf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
659da9e9d198984fa4c1082d49bb32bf_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
659da9e9d198984fa4c1082d49bb32bf_JaffaCakes118.html
-
Size
175KB
-
MD5
659da9e9d198984fa4c1082d49bb32bf
-
SHA1
4e6f6e76ba498da0f2b44eaeb797a659df28a200
-
SHA256
d34bd8041ccc1d52eb5110d7ae36cb22419c3d08c922399982d74f258e925c6f
-
SHA512
8137570898d68085ae8485df4dafae44a61526b11847bd3a8ec65fc9d79ef30ed64e6a7f8644e4c2b0d346c47cef660ec5ebd75dd4e65a050440a4f9d4509986
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3CGNkFMYfBCJist+aeTH+WK/Lf1/hmnVSV:S4oT3C/FpBCJiZm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3464 msedge.exe 3464 msedge.exe 2080 msedge.exe 2080 msedge.exe 2832 identity_helper.exe 2832 identity_helper.exe 5960 msedge.exe 5960 msedge.exe 5960 msedge.exe 5960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2080 wrote to memory of 1824 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 1824 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 988 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3464 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 3464 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe PID 2080 wrote to memory of 220 2080 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\659da9e9d198984fa4c1082d49bb32bf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbac3746f8,0x7ffbac374708,0x7ffbac3747182⤵PID:1824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:220
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:1944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:4020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:2648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:3084
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:4832
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:788
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:5200
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:5208
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,14884975355557973464,18167507201974864998,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5886ae2fb2e4e1c78ca87fdf326d45603
SHA19b3fa36a1fdc4ec2a5a202a4e7eaccc06dca88b5
SHA25628b72407dbd18f5f622328b802cbd995e80f2c7777efc6f61c7e007477a8eaee
SHA5121cab3606773c10f98542edfb2f8e793ec56178dd33f25cb4293227705590c9ccd61bf9e7d3e8a0381d126dabd2bf1c715151e116eefeb79b85318ef328978abf
-
Filesize
2KB
MD52c906a959a929515482e58501b2d7dee
SHA1ee36500b932a10ca08ad4c199f80063e5392f0e0
SHA256b6b41f772ea429864f177a8ac22c32268c75d10955e8a3adc7c3b238771df45d
SHA512360db5c3295cd22f49951f48c0f9f48806f34ea1eac1654c26d7565c7577f4f63fcfe1a09548b193d5a3724d2e1a39026b1c2817b2cf95f74de6cecffbb4bae2
-
Filesize
2KB
MD5cf190f183e7205194c13ecfebd925898
SHA186e255c106dc550c98c322acc66935fa3607c905
SHA2561e3cf061c76b001cc7b244cab71ba28fece2922f20aa26c22af4b11f10c8e5a5
SHA5124da9af622df2ce6c9f1e7b177b184d95d1e7306c3364fc407a23299bf7454b00ef7838ad94126d8ea12d2ab4efc7b3f8d20d9c1e8feb6b1421ee5f069ddab69d
-
Filesize
5KB
MD589cdf673a658dedc729b87e4ec076260
SHA11594fc70e963edf49ccca061696a4d8163bbd73b
SHA25675db211bac3a61fefc7f173fbd40bb6af80ff17eed6ca8311993946a79760dc2
SHA5123a385c5215e4b06c44b1f8048327f78c8039eeb2179387f7fc056242c6c6d6725449aec0d667d962009d3aee5cb32d2aa06721c6289b431092c821495c5d10e9
-
Filesize
7KB
MD5a3a15823552d4b709c83e57344e65888
SHA1aeb4cb1dd7ec1126adee721018fad9d19cdcdbea
SHA2567b0cae7c4103a10b3a656557c2677b927ddd396b7870ad4c3f522f7d02504ede
SHA5120f195edaaba5561190ee7b7b4af803bba6d687c50c2e38f90eca9541c2e9751af9a17eec778a749d1abf24db9ff6983d183a40028c823fdd44987e8e47d75e88
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e680f2bafa2d39a82de638fd33db7403
SHA10a66b2fb904c27c181079c1b5b324f03f34b3f06
SHA25678f2faf64c0a7aef1bc711ead7d7333c1b8e2719ef54d2ad603955c4178b2cec
SHA512e2f9cfc3cfa217d7bd1c517639647f506528268292c84586c8aaae5d328a288c351f9de2e6c9418649edcc3b8f7c4cbea54aecbd71970c2c5c8a7df75d803ecd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e