Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
65c57197f94a8d0f74740b2bc3cbd376_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65c57197f94a8d0f74740b2bc3cbd376_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65c57197f94a8d0f74740b2bc3cbd376_JaffaCakes118.html
-
Size
36KB
-
MD5
65c57197f94a8d0f74740b2bc3cbd376
-
SHA1
b991520d73f9c3441a468d71b4afbf0220a2962a
-
SHA256
bc08ba2ae6a6880517fdee44a56539e38f77776871bda530b6c0e2c7f63f0f80
-
SHA512
5c162767ab078308e4fef33d22d65a514e9bd51184c9d3644591c89302e1a6b0964dca632e960ede7e821fe1d2978d1fc8e0997484940a231091bdad88efa3ab
-
SSDEEP
768:Ph5UJ0QaEpb7IWMBgGo9zjQsaIhaDgW08b/N10PFam29RxgT:5k3pbMVBS9zjQsaI+l+PFaa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3700 msedge.exe 3700 msedge.exe 3216 msedge.exe 3216 msedge.exe 4672 identity_helper.exe 4672 identity_helper.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3216 wrote to memory of 3980 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 3980 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 812 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 3700 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 3700 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4820 3216 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65c57197f94a8d0f74740b2bc3cbd376_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9303d46f8,0x7ff9303d4708,0x7ff9303d47182⤵PID:3980
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,12869526598232385210,9246252888609914299,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:812
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,12869526598232385210,9246252888609914299,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,12869526598232385210,9246252888609914299,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:4820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12869526598232385210,9246252888609914299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12869526598232385210,9246252888609914299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12869526598232385210,9246252888609914299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:3052
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12869526598232385210,9246252888609914299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:4092
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,12869526598232385210,9246252888609914299,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:836
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,12869526598232385210,9246252888609914299,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12869526598232385210,9246252888609914299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:4484
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12869526598232385210,9246252888609914299,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:2648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12869526598232385210,9246252888609914299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12869526598232385210,9246252888609914299,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:2568
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,12869526598232385210,9246252888609914299,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD545e2c08a731c103901554b2a7a732296
SHA150c15010d27938758543f37e95fb28cee0919f1e
SHA25695fb0b1178f622f66534b80fa1a14aaffb6695b5327280d81d6637ec7aa68362
SHA512a3f7157e601a667be7d1c7a40ecc168ae97e04f2717105e4b4feaeb1acd8b624b2e26d3f8787479d79d0ffea87647ce761c62f61b0780bf7e05f0f104a1fa24f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5d54d9125887429982d06d371f78356c6
SHA1d2f4051e067f73af108ec48d587b7b1690fca252
SHA256509ca9bcf8474672c9398aea58f15fd83904b53543222477934aa822aecc7c18
SHA512b98173e7509f012989c7e99dab596c451d1fa8224c10558001d6ab57220ac25ea4349be09b243e5d5b2a358dee04e6133aab5b85edf2ffbcdf30420793f5edd0
-
Filesize
1KB
MD554992f07331425339c3f37345cabb1f9
SHA1dca0b8ef4b6228470814f8e79b3500393ab2bed4
SHA2562d4f02b34ae94495c3d49176966efba6793650f11790f0d51830a9a7368a05e7
SHA512c8e53bd222bae075ba38ca1277a2a10f7934d63f54b3b9f83a3e7d4bf64376f4ee0e3090a27066588c051e56bdad055c264c7a7aee7e559ffb77eef56edfb3ab
-
Filesize
5KB
MD54aa64005287ab578f9834214bd2fc109
SHA147775f185a669cc2137a6b3b612adbb1f2c6e8c2
SHA256b5d0c403f9e8df26129a9005019dab7077b3464ea31fc5d8e4357b6948242037
SHA5128affcf48433afd31ce8481ccf3bdd039539fddd9355871474312e19666f003155a77fce90454b8befe6baf85df4bd61c4ec022795474b57453794e9553934d3d
-
Filesize
6KB
MD5ce16095f1cdc494275a1017ac78e7d1a
SHA1d9127af9b51edf4272165daaa2a0cd48d1cbf010
SHA25619c35b67fc2814a24e51fb9986df58edcb7d56e80900d350322efedee46e7f2b
SHA512e8ebd5b5517ddd869b170776bc99fa48de59480a26a4387ecce4d724240f15b4adb0dcc2385b4835cfd98f812bb9fa0f8c54355f4d295d4d948b143d1e63b3ba
-
Filesize
6KB
MD5a24da4751557aaca98f0adc142079013
SHA15c6f76d5360f394f9828bebbb15141a6883d82df
SHA2563e023824ca432512808341dfc338305fe65d9e724f64ae870e4ef2d55bcadc65
SHA5120b701bc312bb9770b4263d3442f775f09739f167c5256173aa87a5f36c63de946b8c18f7c0ca8fb1354a257b180c1d89c2e430279fcdcfa201c7d60dae22405a
-
Filesize
6KB
MD5575be1c94c210f500699dcb744588a84
SHA1981a383eb645cc251e96274c81893a9665141e58
SHA256c6255daf2418b93abdb3bc1c90d55e5276cbbf3b6c524dd3f8af00ba36f869ca
SHA512f1f963a5af1f1592f57f949e9aad28e3d1866aff58ee5f73cc21f7cc40f10ec136b4d7b0daa579eeaa3a5553ca268a21dbaae484b76014955b37253f44f4f339
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5001b1110e52f78d859d29c4a76b8a157
SHA1fd97dd5b2cba5f591e9a1c3069980cc5e3149560
SHA256464873a494ce4fc24a0d843c1ffdfbc50538327d74f5ac8da983cedf470f2da8
SHA512ff829a09fa7bac46e42d3a5f8d376c1e4d53ae523317b815c8127dd8ac6d7e07da460dc46935696c18884975d1190623ad1e548a6cf800657e7c724c682657e1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e