Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
6939d0fca6a3312dafe7a0f1c061f47a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6939d0fca6a3312dafe7a0f1c061f47a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6939d0fca6a3312dafe7a0f1c061f47a_JaffaCakes118.html
-
Size
175KB
-
MD5
6939d0fca6a3312dafe7a0f1c061f47a
-
SHA1
6eece7adf9d93ad36a4166c93dc547287d8fbfdf
-
SHA256
0d9d86567bc4de6f7990d27b6afec3482833928ff689009a60e02bd99c84da3e
-
SHA512
8b015b3f458dc909877a563031fa6f9f53f987a8771ed3b1955d68cd6b33c30b0a3581b7f6144f574193ff8735c06cb83cd1295594fadc9289764bc85e6ee75f
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3OGNkFkYfBCJiZr+aeTH+WK/Lf1/hpnVSV:S9CT3O/FRBCJiqB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 5088 msedge.exe 5088 msedge.exe 2508 msedge.exe 2508 msedge.exe 4296 identity_helper.exe 4296 identity_helper.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2508 wrote to memory of 5004 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 5004 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 3352 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 5088 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 5088 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe PID 2508 wrote to memory of 208 2508 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6939d0fca6a3312dafe7a0f1c061f47a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3fa246f8,0x7ffd3fa24708,0x7ffd3fa247182⤵PID:5004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3352
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:208
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4472
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:624
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:1036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:1228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3756
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:4352
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4304
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:3844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:5236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:5244
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,4978740796701947922,7975486890227655988,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5312 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5211aa124236f476c597718051ffdbe2c
SHA1c5fcd157b44c40f0a64234a92b36da79bdecaa99
SHA256066e26bb604d54a447f9d1d5dc40a7ed679d92edd84cde0e117d8871e31844b7
SHA51292d588a948400b174486c8e901c1feffa7239ddbde65ebcedf6f3b4d1b11ebdde48fb0c32cb71f17c14b8e94bbe095f5d2122bdbb5912894b3321016ef094677
-
Filesize
2KB
MD5654a8f1b115a46079c0d869f91e25427
SHA1efdd387a8b2e36f6f8158f6ceb9f11d5cd1d8c04
SHA2569a02211ff41810ebe8e3a388da898139e589af987936b694cd27ccc8094c3308
SHA512da92d3990b44cf70ce51cb57bc1f95b42c7cd6f0571dc179f857bc5ceb5916386ad588ae9cc0bddb8ec7cf0eebc0ebb71da32c030dc890bf36a77bb6e10b6c21
-
Filesize
2KB
MD5097d0f4d90fb7f3933462ad09ed9bbd4
SHA1855971c37b65517c0fe37912df253021d05cd1bf
SHA25615befff232886622445fa0a929045f3fc922b2915a758a9ee9572bd65a67a1e4
SHA5126027da56f57452a7279a5c422ccb81429a56f3357dc10e4343175b27e4fc77ffb9b9290f5c6049ef37583148ad5f89a36df78f26f9f9cfc5cd1e327a153129d9
-
Filesize
7KB
MD5384f1d5e91d8789e0132f83d17276613
SHA157b3832afa4dfe2d8c679cb095f1ef9d846f4dde
SHA2566b1fa4ca7ca0049e187ad0fee9d394c2b4b0ac58466a2aff45dac14fad670a27
SHA512536c9f5300efcc1a18d7344009b4fce6b3db8d142e668a7e247a53dffdd67baa5fbad91e055c40cd7fdcdda9bd6cdcaa677ba4473e86e2d96ce4cf85347199a8
-
Filesize
5KB
MD58edf2daa5ed7e845f5575a46fcf7f007
SHA185e0e9a1ad6af75c4f82647424c0e92ee93009bd
SHA2567fcee99dec15dad1fd482ad01c24f1bb6980aec8495f20b14327441630d0f120
SHA51272b24144e57ad17e4f1ec1c6ef08b55ac0cd497a76a72c824422b4549690aa9be9c20efa4ba7f81a4cdb6bc67eb9317ebc24d17e5b393ea04170e02393468c4c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56a480ed1b3edc88220ca0f57792c93e7
SHA17c8fc3379fb15105f46ec46f04bbabcb8feb1197
SHA256698c7ba5d180c38bbeadd0e41f7f4fd4f3c17bd36eb5d7a7901ebc30ac6568f5
SHA51275fc662dae41422faf5e5a2e2389ddde3753535a48cb63bc9106144c9ed3ae22c442633000d4c713d5c39fcd34d83b2a751c825cc87a5b856c43eab9640f4eef
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e