Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
65a83cd54e48b578c1240b24e2280ad0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65a83cd54e48b578c1240b24e2280ad0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65a83cd54e48b578c1240b24e2280ad0_JaffaCakes118.html
-
Size
175KB
-
MD5
65a83cd54e48b578c1240b24e2280ad0
-
SHA1
f9d6dcfd507ddd583bde659f25400ffe67bd3a94
-
SHA256
fe7eba1c35609ff4213e73b4212354a781d96dfceda6a321c00cd228eb6d48f8
-
SHA512
c6ba16b84f070a4b5362eec40d8018fc81f1e40c666749cd2fdbf1d2c958d6bc42329a671c45b51744f9d7a7f097cb13f975609296297ddfb04682bb7a5b7ef8
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3+GNkFtYfBCJiZM+aeTH+WK/Lf1/hpnVSV:S9CT3+/FoBCJibB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1496 msedge.exe 1496 msedge.exe 2688 msedge.exe 2688 msedge.exe 4980 identity_helper.exe 4980 identity_helper.exe 5724 msedge.exe 5724 msedge.exe 5724 msedge.exe 5724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2688 wrote to memory of 4496 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4496 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 4376 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 1496 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 1496 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 2448 2688 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65a83cd54e48b578c1240b24e2280ad0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdba7a46f8,0x7ffdba7a4708,0x7ffdba7a47182⤵PID:4496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:4376
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:2448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4144
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:2200
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2588
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:3896
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:4936
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:3704
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:4412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:2236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:2264
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,10350492823172170607,6484195298420003237,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5d268e86b264a319d1721cbfead9f008a
SHA1bb4ff3a6b745f546bac4452b9c4f41c1dcd7deec
SHA2568e5263194c6ced63cf213b49746edb8f7756cb739e9795ed1aab7b79e4d6173a
SHA512b94d4d1a5af9c35d8af0c73ea55a4fe8668c697540c41117de8a7fe8852395019c2b850d38758f59591e28f34e882027c8b66626fdb18435532ce69e299e7846
-
Filesize
2KB
MD5eb5b263469c32a59dc72794207072d7f
SHA1db0e21088224dfd5c81a8cff06b5fa99baa24252
SHA256049d8919ba653e5e35cc2d94707c30f219e20a99bf552f13e64ca85028c4aacd
SHA512f39c788e754ee791fc0a4f0ae557c0a9c955a1503b021b90f8a6dddbec8d36f86c8676a5ea659e723d599b4f5d8cd19b9aa0787a58f31fd6814ff7aae76b8264
-
Filesize
2KB
MD56037076a05c99cd4e23afaed727eb51a
SHA15e0b2207c49984032064cb99a0d9713fdfa07fde
SHA25649fc79b8d5a308ee45df69c3955e114b9d7427c4d85dc77c0a292ced61db2a9a
SHA51288175fff69b99ac6c54581ff5eb93efbe1a60384790bf705f4fc5de7b59898dccc2e08d0c2cc8f16cf0dde467107acb5cc41998374dea67ecb98f0c4400c4e88
-
Filesize
5KB
MD591409369cf5f2afc8cd9be1e7b44da6c
SHA1ac96cddec1e896786d5c6e4d1326218e437b20f8
SHA256653a5487cc8f8c0d93e93c4bb53ce29e61127e63cb13129c7f771d0b30e75d1a
SHA51274941ead57436a0bdc07c14a5b7505ef438b796e2471b2a2a94e8220df4bf09278fe1fee73c2a285da6b5dc740df433e00c41994d013b0dea8d24f4852467254
-
Filesize
7KB
MD5d32f45827da5d0c41f87d25fc34eb4f4
SHA14b0d59217ab70ae583c4b0348cb8dfbbad6b3289
SHA2568d0fd350789edb8c973313d72857fdaf9ab4096b6381beb7fadf7e00616b4b65
SHA51257d56487fa99c6bb6962cfc65ebeb98f1664bde9e701623745636c07d126831f5cc87cb0a333c87aadaddc4f82313b866f8ee5a5670c2a9471eb75476ae98ae4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5092b14afbff2594046c839e38f83345d
SHA1ec6f471a031c05c7ab67d823c764915022305ca4
SHA25690fa4ec0f53eb1527f1c65ddabb2887dbd0c4c14444ab103863ea581639beefc
SHA512973a0ef1c94b7a9d5864be69afc0e5d91764d243296145358c68a2fc7475ca78959e39fd89276a0ccf49e7ba7022e46bdc47cb5f701ba29f85cdc571205483dd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e