Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:24
Static task
static1
Behavioral task
behavioral1
Sample
65d725e21a9d793cd007e85ded2c6622_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65d725e21a9d793cd007e85ded2c6622_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65d725e21a9d793cd007e85ded2c6622_JaffaCakes118.html
-
Size
74KB
-
MD5
65d725e21a9d793cd007e85ded2c6622
-
SHA1
ede157f513d1623b84c8da853bbcb251e373a527
-
SHA256
0155d942ed5a5c5b6e417f78a3eedc9ba8d7dfa7ccf73a44fd66d9cc45391d4b
-
SHA512
66f49ecb6b72fd324309f27e03cfc3b79c4fb70e3a2179f0f3701e7f4683bdc155150ab9e5f2a188eecf6fafdb33efc70745723e10c6b3e6be348bcf8e37852b
-
SSDEEP
1536:qZlPZPAFBWnhpjdOWOcY0pmrsbggjt2eVUDDkw754YLNN1NGhhH:qZlPpAinhpjd6cY0pmrsbggK754YLNN0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1216 msedge.exe 1216 msedge.exe 4252 msedge.exe 4252 msedge.exe 2144 identity_helper.exe 2144 identity_helper.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4252 wrote to memory of 1316 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1316 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1404 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1216 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 1216 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3160 4252 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65d725e21a9d793cd007e85ded2c6622_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9272c46f8,0x7ff9272c4708,0x7ff9272c47182⤵PID:1316
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,2849608448679858605,3574259770571386892,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:1404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,2849608448679858605,3574259770571386892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,2849608448679858605,3574259770571386892,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:3160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2849608448679858605,3574259770571386892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3816
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2849608448679858605,3574259770571386892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2849608448679858605,3574259770571386892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:2368
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2849608448679858605,3574259770571386892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:1576
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,2849608448679858605,3574259770571386892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1332 /prefetch:82⤵PID:3200
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,2849608448679858605,3574259770571386892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2849608448679858605,3574259770571386892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1408 /prefetch:12⤵PID:1492
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2849608448679858605,3574259770571386892,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2849608448679858605,3574259770571386892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:3760
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2849608448679858605,3574259770571386892,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:3748
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,2849608448679858605,3574259770571386892,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD51c2802935aa7f041973a04e07750c4a9
SHA1b38778c3864c59e77a043d5725924327bf4978f8
SHA25691f56717893c129bec307493a70184f84680e786df26384ee15b7143685bc374
SHA5128cca5572903ee88e9f3208aea649ac26fed492e71cbc02c6242183919ccead9174fafe403bc12aa9340d6a71a1ac462872f30432fb2ba8d3e536b7c7cc26d1ee
-
Filesize
1KB
MD53db412409c93c18e9e7688f3fdad5e87
SHA10ac43edd7a1e657e5ab5425f14c36a1899056987
SHA256eeda2db5f5c24d2c9233a45479ebe735a155dae4b98d77cb0bb61f87c41aecb2
SHA512491f54eefd8a8eb253a5f3d8cebeb9829f3e9d88de6a5e273139ba841a4a795a6122b490f3dd2666655ba8de9b4eabeeb9135c99a6c470917755c2458a8ea9bf
-
Filesize
5KB
MD58de718245ebedc31c83e3cf553f17ba0
SHA1362f39212dff8520a29d2b8e1e2f10be84a6f86a
SHA256b140200bb8102561c645b5bf28292f721cd0c9ce01ec3767973df99f01fb9ee3
SHA512da68eee488c3474b9fba63e2601d6854a1821bb375aad2a2ad340a340de921d75817e0d9c34396ab1d9365a366db117f8244c0f244a01ac6e00c81b0aef10ffc
-
Filesize
7KB
MD5376aae6cc9489907e2ba4f0743025b1d
SHA1906c0f121c00eb1824622cde402f9aee4d5af5d3
SHA2566163326d02c9b8d465e3b44299d9dda21771d666844c692af1a49716d91b6070
SHA512075c82fe8c26731242dcc4fe2b36f918bba052d31d115debdc1fef3d31bd10c053ee9d1bfdeeb343547bc024e656d86e781e3acfde5602ed0a5d06a0065d503c
-
Filesize
7KB
MD5dae4f5e501a0f6c8ba01aea4c5aba83d
SHA1ee75a59ce30f13a507790959b4d7f9ef46e4b5b1
SHA256403f29a70037b0dd156e334c18cd01414a4412082eabe10aaa7e5195c54c56ab
SHA5126d9ced671e0f97c8c283fec931096cb13fbcbab366bd1a20b5a1093bad93adbd55fcc43d564986d408ba488edeb4051fc025c1a617a6cad9a9022e302ac8d3e1
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD587e853bd68c973072880db238ac87d5b
SHA19d2668d24961b64a2422196130698662372171a7
SHA256f154fb5b489eca5d2a8ca57092d026efe0ffa4c3ee277791fb8bea9124a06a30
SHA51279fbfdfc1d7b8f8ed43b94f4f0b300f20148e6c3c1cf5956cb8be7f0ed0409c029d1020518a849d1d558c016f5354565fb93ae72758287c7324b59d5a856d067
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e