Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:09
Static task
static1
Behavioral task
behavioral1
Sample
6918ae05e6f7befc9d93e7dca483b309_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6918ae05e6f7befc9d93e7dca483b309_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6918ae05e6f7befc9d93e7dca483b309_JaffaCakes118.html
-
Size
175KB
-
MD5
6918ae05e6f7befc9d93e7dca483b309
-
SHA1
301393e43a1e90c2ac28d8f7978f28e3443dd6ca
-
SHA256
db10bee3185ebebd62bf8e2c0e30ab3d539b9b2c054cf16c48c7515e25de236c
-
SHA512
1dc7644d6a987c4129218105c0e7ef00e4f7f56c47d358241d08e206b74fbd00e27f612bf0d248ec2dce73448438cd51d75271d7626960fa5a3bf3229a2d9669
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3HGNkFtYfBCJiZG+aeTH+WK/Lf1/hpnVSV:S9CT3H/FoBCJiRB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3340 msedge.exe 3340 msedge.exe 3196 msedge.exe 3196 msedge.exe 2836 identity_helper.exe 2836 identity_helper.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3196 wrote to memory of 1684 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1684 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 1520 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 3340 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 3340 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe PID 3196 wrote to memory of 4652 3196 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6918ae05e6f7befc9d93e7dca483b309_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1e7f46f8,0x7ffa1e7f4708,0x7ffa1e7f47182⤵PID:1684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:1520
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:3708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:4616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4668
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4380
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:4028
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:4224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:4648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:5196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵PID:5204
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,16026763278379495681,7701301275521992050,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD518f197f6272c388ff239d7c712a116aa
SHA1a94601483114cd5fa25c283dec3a16693e8d87c2
SHA25645c74e7e8b65e719239d56094d80b178b5682d6a15f78c2fe0b7645c53caf5f1
SHA5123965279144301c91635680be6435b4c94281291e2a96369000676c794878248562426e40a1cff63f375cd381116f19a03984fd1febece44b2e46d189cba96b99
-
Filesize
2KB
MD50d5856b6024a703a98866b6819e938ef
SHA1e334d8b7a48b8140f91d5868ba783ad834f27214
SHA256b8af8208721a58d06c7704c496b87be7813083ff2377c1f5f273585acfb22592
SHA5123267da30779f569b2d0e54efe8e4a6277a1139ebd345f9beb0bced6e392489c2b1130ffd8ba20f2a0f9bfe339afdff4eb29221d1bc896c7b5d621ce58dba3c75
-
Filesize
2KB
MD5b7f850237e4866f71ac7c299d64fe85a
SHA1cfed42c8686b483dce9a785fb079a1b1b5a71c96
SHA256c9cc57745da826a7bc8208046bf40f4d7945306a67ee491a3f344d85328c538b
SHA5129fdf1bb1cb4ec0af443f78830f6c71408d830357156619e3ed8f0463f6e7146ce7e773ec17da3c9e3c726ac12fa7bbb33cc2aef82eaf9c2747ac09fe1fb74d8c
-
Filesize
5KB
MD5d6c064a03631d458731427ae6a2d49ba
SHA12a967c59639bc2a59f25c2694257be1eb31595ff
SHA2566a03a34882e9328a1ceba500c820c79cff2bec1d1057f4d2708a08ced78802cb
SHA5122d9c9a396b2010ca00d4c0928e645997c3fbcd844872877f14c9e39f09e946d41698df4977fadd0afa2574914f305327cb59cdfc0ce5dffc95d330e930e1901e
-
Filesize
7KB
MD50561877f3f044fe9f43d5447539f80c5
SHA1972a340b46d441f5b2a03638bead35b2d2914e54
SHA256cfd04989872fcc5f1015091e6242cbf60de7c47d183e5663ab2179fd67d57e37
SHA512761abe2280bc2191e926a3f1e76521c30524230b43c2fe263f0560903e0fb20276f48c3d89259ac00887e4d76ab5958dae02fe137196165a11713adb1f469731
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD562f718cf26aad60e8a751862d07fe882
SHA1bfa5f123fd760e599ac971f5307398808822ab3f
SHA256ff4d11edb9938d725b3ab3cddd385929af30e8ea49575b56e765820ccceea40c
SHA512775038a9abca87aee4ca77103ad87ab6c22ac518a7c9555c7fc8ad82755771b203e6eba123e64ab116dab1e18adf93644b0852a6e8b16f040b84291c77d50c68
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e