Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:23
Static task
static1
Behavioral task
behavioral1
Sample
65d6fcdc03b49826cd98f37a7f49e040_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65d6fcdc03b49826cd98f37a7f49e040_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65d6fcdc03b49826cd98f37a7f49e040_JaffaCakes118.html
-
Size
175KB
-
MD5
65d6fcdc03b49826cd98f37a7f49e040
-
SHA1
1529712fa862dfbb8f476af4db45da7200714177
-
SHA256
9d5f54d63984c13d40687c94961d7f3bfdb4057cc496fee6c7a9f7a021c5d887
-
SHA512
aefbdd330087321e1a8a82edffc17acc383272452c2f69e4bae100ed7d6fd59151621c4f3d8b21a6afe85b76193307dabb4bbc5393af927d8db81b7e45a8417a
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3aGNkFHYfBCJiZ6+aeTH+WK/Lf1/hpnVSV:SHCT3a/FWBCJiBB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4596 msedge.exe 4596 msedge.exe 4692 msedge.exe 4692 msedge.exe 2776 identity_helper.exe 2776 identity_helper.exe 6120 msedge.exe 6120 msedge.exe 6120 msedge.exe 6120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4692 wrote to memory of 1888 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1888 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1172 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 4596 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 4596 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe PID 4692 wrote to memory of 1736 4692 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65d6fcdc03b49826cd98f37a7f49e040_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd329346f8,0x7ffd32934708,0x7ffd329347182⤵PID:1888
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:1172
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:1736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1420
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5060
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:1840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:3568
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4928
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:1724
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:4844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:5024
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:5364
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:5372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,2153778978244183761,15894062208197835090,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3660 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5b4a2a8655a7b76bccb3b02c45e778cbf
SHA1287670a7b3ce96ee6c9bec7854142542a6c52c9e
SHA256f601d7a300aaa570f73301fcdd4d2f867a77121906c00950308353847a380c77
SHA5123e5e47ebb661076c1ef05a5d0d9ce693ea304dc3363447b041dccf973f291e9ee174d9fe6afc387292e95bb1ca6ef532d1578482cfd333c3e1d1a0a96cf7548a
-
Filesize
2KB
MD522c2a90429133ef76449c5630526f694
SHA1fe1fa78aa1240ea10fd9d5765d62f9a5773188ad
SHA25631995a543381ad6bbfa45e6ef5d494f979eff88869e1d618b9d4840ee7e2cc60
SHA512bc588a3ca0d36bb5d5d5f59aa9d4c667d177d7fe3ca005d9a463ac57175bcc9740ed90625be1b7ecf08558c5810a3c42d332d230f21f0592f0cc2b62b7bf7e62
-
Filesize
2KB
MD550033651a4b64f5d3e4180c21e710d54
SHA13502a3e084a6b52a746d172a955fd4d0a239936d
SHA256ea8e1ac7004f9d779eddd9a2201b2cc005d8ee5e03a124032decf25d45556a9e
SHA5126ae586981680828740407b12e6d687ce3d15ad9f379401bea6c59869cfc0dd9e98ae8b0192668c6bdb7873bb7062df6143f8d024e4ec7715457e2157c49f2821
-
Filesize
7KB
MD57c9e88ba5a78962fc7dcd654158c1c88
SHA19cbafb8abfeba2ff450b3201d46b316ed5758249
SHA256a783e28fec45d95bf13cb5b4ed8400d634e1d36dc63134fc6a2c892a6c3ff40d
SHA512744085050736707ef422097f1f6e19da27df3bf45a733fa8c38265cd3a1bf5c6ec6f355610d67e489290d00599e5b4d569a1dd33acc2ada43c8835f3a4b40f70
-
Filesize
5KB
MD5c27166a5a5670447bb5cf72a19a5c3c2
SHA1ea40cb24f5c6aec6857d746d7b9604cc67534e8b
SHA25694e5cdb68f6288d7ca077c4fe1d641d6720db5919846d6de1edabda2c3434730
SHA5128083fb84965b08aa084bdcdd88d88376d4e9ad0d2b5618ba689fc51a9afc21671226568de82b73825282624355b0c4137df94fe1d622b324f1561afe9373d661
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f8e74d4b0062857decefbf40f35596f4
SHA183c3ce8f390eae57810305ee1e04a98393f05fcc
SHA2563f74538e7f285fed4efbd500bb5b8d3ed6f6d45b5dcc65a7522af6d2334b390e
SHA512607e80247ef12bf5f64cc58a1e2818eaf48ebb4344a12c51a01978ebb296f6e7133c928b28a7c0dff923647197b73dbb1cad98939ab1d65718728ad39109feb4
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e