Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
6939f174ec0f2e754cf1606394ba9894_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6939f174ec0f2e754cf1606394ba9894_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6939f174ec0f2e754cf1606394ba9894_JaffaCakes118.html
-
Size
175KB
-
MD5
6939f174ec0f2e754cf1606394ba9894
-
SHA1
3451d584b04ba351af79320bb774d5d59d49a327
-
SHA256
faad0ea250f56b306c4ba0582ad2c650e47d976736cda410135cfe8dc63d4a1d
-
SHA512
72425249f4dabff972dbcc525c9c027bd1f7a0113a4090fc8151cd15c12488298bd8195000df96daf11482f28470579e657e48f11373a497611f18d7f91d6ead
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3mGNkFgYfBCJiZc+aeTH+WK/Lf1/hpnVSV:SHCT3m/FVBCJiHB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 872 msedge.exe 872 msedge.exe 2348 msedge.exe 2348 msedge.exe 1464 identity_helper.exe 1464 identity_helper.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2348 wrote to memory of 2664 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 2664 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 3780 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 872 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 872 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe PID 2348 wrote to memory of 1064 2348 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6939f174ec0f2e754cf1606394ba9894_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:2664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:22⤵PID:3780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3076 /prefetch:82⤵PID:1064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2084
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:5068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:1544
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2904
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:82⤵PID:3220
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:4996
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:3512
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:8
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1476,2083589740846369709,1483953583818220724,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5428 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5d1e79c4fb25d844f2b13f07b2f22db49
SHA13696a0ac0f1d8b2d98a6784714d1500f7bd7be87
SHA256121a7e559f8e5cc1d334df788bd5acbe1b4e010de8678ef6146fa08ca7429fcf
SHA512fbfeab8fefbbd9be8d38f0727b8c42a903b0727eeb5c6fc1acff94ed9e78d9510ecaa42e6e1e1ef62975ac7baf98b1bf68147343a34ff1976c6f934d0c98f787
-
Filesize
2KB
MD5b6c4c6cd65bc54d5c271f6caa251cd47
SHA1e1b904db4a7b7fecb3c44480f05af9bff0bff734
SHA256662e7578c4921ba31d55cf69f6abe8311590fd4ed03cda2a35c54f2b91244ccf
SHA5128f0ac0f78727772ecde9698e6f13c9d5eb7f74421773692d54039fe776271a63e4f816b0a4bc2c27e3a4ab35bb62c78e6aca6bce75794a90d203b21a6e4aff51
-
Filesize
2KB
MD5910014e166d05084fc31e6d0efc1103f
SHA1688263fe16772001be4aa516cc900cce73b2b216
SHA256fcc35237d70954062aef917025afe7603459f2180c27d92b853ef5d60eb98c2e
SHA512944a9d6a5352daa1aff6c741e94ec002d45707edfa7c77926f62f87cf44a36e699b64d212f5f5972cb028a1fed07470424aef27888e393db6d302ddc1882eca4
-
Filesize
5KB
MD5fc83278115c41333d48c0b17d80691eb
SHA1836b237db3acc1281edb8ab51bc7d42145b2cb37
SHA2567e540c769c8631e0ae851675cdc4e94706481d6e3cbd418b862d652c737c8577
SHA51294be3f613dea8707c438203d75c26b24b8ac6cdfa61307a35e929bfe5fe49c5ae18b11585a020c06c35ee7d717400040ba13679b31b635ea751971404d7eb33c
-
Filesize
7KB
MD5e0e01731033a692052281a4bf44d58ea
SHA198872375b3f5c8a37313f85a5dba6f4e403d4e40
SHA2563f196a16d4579e6d77b55ea0f9697d08595c5f4c2c495a55ede168ad2ef52c23
SHA512c2b3ed503cb501596ee253a8a61c7857903e22d53ec3ee5aed75865380a49f4848b06b76d06c972abd88bcb7d42cdfaceeef75a4371616fdb84c744090b9ee68
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f97691cecb821ed1a212d1c40bf4e402
SHA19082beb5902f59c9beb45a516ba5791bc2306d6e
SHA2568ea603b77b07be4201d507ab16d7b09ffd58c0599bfde555e7c3dff684a24a61
SHA512f0bf6dc3ca4e6125d5a8f72a678c5fbc6da90b82e4849fef707fb1b0a478ead66517e24a8bf1dc96edd0d7c4cf675904db4e01d1c2c454737a48cf265f816447
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e