Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
65c5daa80ebce5081d702a50cb233025_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65c5daa80ebce5081d702a50cb233025_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65c5daa80ebce5081d702a50cb233025_JaffaCakes118.html
-
Size
34KB
-
MD5
65c5daa80ebce5081d702a50cb233025
-
SHA1
c04dab2d66c0e000584529786470fba5d1e3bf31
-
SHA256
dfca605deb4add7d63d27e46f47936308d72244894f7f7544f0634084f1eda8e
-
SHA512
c6617852a1131ed6076212f3fb79aa71f4546b461312e1c75441c5e60034e68ce22781610a0839296ebd0a74beb917770ed9cce6fd3dbcb3bd07dd0875886994
-
SSDEEP
768:IO7eLWr/DcUitOz3tmgrvVJHmXgcTphgq:INLWr/oUiAz3tmgrvVJHmXgcAq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4668 msedge.exe 4668 msedge.exe 1816 msedge.exe 1816 msedge.exe 4896 identity_helper.exe 4896 identity_helper.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1816 wrote to memory of 1016 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 1016 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 3764 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 4668 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 4668 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe PID 1816 wrote to memory of 372 1816 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65c5daa80ebce5081d702a50cb233025_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd1d746f8,0x7ffbd1d74708,0x7ffbd1d747182⤵PID:1016
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17754956895895526710,1952028568249928167,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3764
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,17754956895895526710,1952028568249928167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,17754956895895526710,1952028568249928167,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17754956895895526710,1952028568249928167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17754956895895526710,1952028568249928167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2876
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17754956895895526710,1952028568249928167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2532 /prefetch:12⤵PID:4916
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,17754956895895526710,1952028568249928167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:3484
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,17754956895895526710,1952028568249928167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17754956895895526710,1952028568249928167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:3000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17754956895895526710,1952028568249928167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1772
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17754956895895526710,1952028568249928167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:12⤵PID:4780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17754956895895526710,1952028568249928167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:2980
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17754956895895526710,1952028568249928167,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
46KB
MD577e80163afc68a70c09233f24c52f560
SHA103cfd9726d36b43c3b139ebcbe95c5a28ba5a953
SHA256acd729fdd132db79dc7a270cd50e19f5b7504b880936c2e77c20e5caeaec06a5
SHA512fe3456727a5d66fe47c89532141af464a14b3c0985c843c33018a2cde9b81bc1debd5cc201ce4dfaeaeb754236a258f45d666d9c905479c8f30df45b286462d8
-
Filesize
19KB
MD5b992c177fa0ef093925b3708912a6b62
SHA13f794d56fe8208c03ced8c7f8eebcd8ee49a1ca3
SHA2566340933abea2f958c8e5ef647fbbbbdafcd9b5fa929aba37a1ec8504fabe15f5
SHA51272fbcf1db7a4d4e86895a2e0309e54177589ab5ca07142db80cc203a668feafbfd8f6f44b7b7bc387380a487ea8da10d88449b0d4261696e498fb2d768a0365f
-
Filesize
96KB
MD58953d90721f881cdec5dc365d4150de7
SHA16765b812d69eacf8e07324211d1dbcafbec02001
SHA2562421820b65ddaa210f2701de6f8197fd1cb66ed2cd4f3bbf9c74323aeb98addf
SHA5123a045829c01caccd7c884d29bdd453896fff401b1413fe5c8c63d9c94db2f14c5a01e0ec1fe645955d11a4afa0c8ba564da5e3e70d6bdfa27079d68efed250fd
-
Filesize
32KB
MD5871805aa009751bf56fcb5ba760d6a5e
SHA1f3e7b13552ad9bd55b4f0a6555c681340a7a4ba9
SHA25675e9859b2dff4408ac01081c83a2dd4c721bc49b87a949448261d6006fd72733
SHA5126389e9dd9837d6ab20e1f6fb76dd6ba6474c1cb3ee29526b7e4582ee0d316b10fe983a0cb71df52e6a7f05536a35bd694fe4c3df84c9ea25bb112602e13f6109
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD508d17679586dfc247df16ec36102559a
SHA150d8f8d1dad4be8162e1e30a72161b8bd1a46325
SHA2566551de3506f51b91b1b3fdb6b9fc5ef016897b6731cf8d6f5b5db89f96446792
SHA512544b8b8d2c9f06a3b5933f44493fc6083b7b76fd46943adb4c2fead6dc1eee1556ae270c1708bf6932e67f6a3428104e604865e5a7655868c102f06203c59d6f
-
Filesize
2KB
MD54da285ffcd2d9c4b53889144afb93927
SHA1e5ebad4f6c96367598336249e17fbd5eb6ef735b
SHA2564a1dd03888fd3f63d8169cd28c3f78a311b6e8a30b00feaaeeef4b242c7346b2
SHA512232791d22ba30bce6d8f67ec029ea584c54f2b8ddc39c821babe3dd7c3befda1f27e4db5d1f2f2952856d25c82567a04197a16e7c0a582ea5734e2970a45ab4a
-
Filesize
5KB
MD5f56ad2e12cd35e0c79d8d18eb9cb1c53
SHA1f82651b25ee9a415a3c06929eb4cab4c6fdca935
SHA25681770093278eed2f955bd9ca5197ca39b01a8881052e91c205e411f84a35cabe
SHA512c60ae182611baf6efcbebc575b34e7b990a571724e423ac18d425d8b6e8d1e36948d5aeb552b93ddc94a0d7134c99b02d852677d7e2b7494ad25d4d54bf92111
-
Filesize
6KB
MD5300dc81c00acc278247bbecccf042e59
SHA1d9dee3f3ff2f37ce8d9e570dd0d93e9175912f44
SHA256fe3d097f018d63feb6d0508fa2f6a77274230ea7fcf0cd6bdd01b5bb3fdab97e
SHA5127b927a7646303e03c5959585c0c447967d45dd5fc08aef6ba8104247aa8c036ae3530be2710b7e7567fd3ec50f939ae07433ec2dd919d9500fe4b546b238a5e7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a7a826f4c1a455e40248f55f979a8202
SHA1b0b0e193dace9b183fecfbf33fe6382bf0210279
SHA25658a6e618c1cd591653d35b7605f81a3f4aef21b5a6b4ff223bd4fc0bd389c3eb
SHA5128a8d177bdc8d5b676bec58d9bc3c8e257b9498852eccb48096000580b741b437491821f8093d7ec89a47a3e6c1bd840bdc52056de276f0fa470c2b746088b5ea
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e