Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
6896f883e4f58fba0f98ca83ce3d2a56_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6896f883e4f58fba0f98ca83ce3d2a56_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6896f883e4f58fba0f98ca83ce3d2a56_JaffaCakes118.html
-
Size
175KB
-
MD5
6896f883e4f58fba0f98ca83ce3d2a56
-
SHA1
6aba2503aef9adf5ea66f2fdf3b505eee88b35a5
-
SHA256
5d98843894a0f17a7fa7efadf12454d5f61c18d73e4f0bca80f3d7232c92654d
-
SHA512
1cb02a2cc4a66f0663105cfbcec08f965ccef2d32b7cd965335f6e870e71085ee7a0c51fc01e87c4428e0a60e99e0515264b9d9a2b60280291fc71eb1133cbc2
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3xGNkFbYfBCJisZ+aeTH+WK/Lf1/hmnVSV:SOoT3x/FiBCJiRm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 5012 msedge.exe 5012 msedge.exe 1524 msedge.exe 1524 msedge.exe 4344 identity_helper.exe 4344 identity_helper.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1524 wrote to memory of 1760 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1760 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1700 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 5012 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 5012 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe PID 1524 wrote to memory of 1160 1524 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6896f883e4f58fba0f98ca83ce3d2a56_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d7046f8,0x7ff84d704708,0x7ff84d7047182⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3588 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,2481820424617190331,16266137745947131688,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD543db6077310754a91b53cc15ee0d1079
SHA140bf34747d67189c964f08fcb0e6ae5a02beb43a
SHA2562db587edd24b4ce4a26b99fa8dc69d7468e88f18c9b8dcfc65beaa26d171e831
SHA5125a2d838f7fc833390e1c7086736d1204395f42be70bfd4578d0be2ee48f87f8db3ac1d326f88af5020ceea78b72bc49b6801f8b8859dec056e41128c95d8594f
-
Filesize
2KB
MD54fd8eb8a994720d24322b24fa9d74fe5
SHA1848d909492725b1292c9392a533c864291490711
SHA256d4fe261c8aafcdd60d2c2f4e61ca402a4cec938a80a18e0186f1efe5e91c1d4a
SHA5122a9f034e4fe8cafc01d49d45f6bfab190437366dc209764c7745bb0ac95825040993a2ba8820ef65d281046906b260d476799852b5e678fb3232fd194ccb712a
-
Filesize
2KB
MD5697d2f2e8339eb1731ae12bd020f01b9
SHA12e44befd53216cb96ccca647dc87bcff6d7509e4
SHA256a4ec85976ea0b42d727d3f941b052d9974abca31bd7eff01b47f1dbaba5502ad
SHA5123e6915f24f681f971814f9207bfb8c393c24bdcf88ecb65115d8d26f3160c1a352c99839b835caad9232e87a7fd1157e96a5dd0c423de2aa9636f521ba1634ed
-
Filesize
5KB
MD57172dc3a9a22c349125a2fc965671749
SHA12b47591cb280cb330644a6ce9e8f71623a0dc9d4
SHA256183cdd0cd62b623d6ebc3f34e0ffac63eac4e71e7f9328d3501d5ed02f47ae51
SHA512c5204bea0d1c64830ac0fa50af10ad3c92e6e50fb5b6bdd36de4b4b927000d26efb0063ed973007c26bf7ef0e66cf1b77fe865e7f1739a3871e77b05f2701c74
-
Filesize
7KB
MD5298978f169f2ff5c8b2c881c87742dfd
SHA1d5f7f77c005c9e5a4618839005f42e33059a8029
SHA256edc7abb49712fd8b142c11d29391e576bd95f9b7644025799550dfc49b8b7ec9
SHA51228d03c05ce1920150e551e88052fff7fc624f185373b26e94c5e1829fc79dfec9de270c4dab9f1881fc9b7b2a5116bce8f39b177d95fb1ee8a4f8397cdf71f11
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d1302124598184b9dbc995d5a88c6c65
SHA1e011f4d62db63df90ef6589c3bff685d14565223
SHA25653bea6abd0dfc67bc7ae1ce2b8227a47b207fc184b5378699816ce363b9d55f4
SHA5120f7be6de76a1b860b5848081a6e4806a915560d1a4c91b6b93d38bcba4ad0c480b45f5bbb9c2d4f6a09f8dc36422282e8007fb259c3d1f53562623ec9554c5e8
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e