Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:11
Static task
static1
Behavioral task
behavioral1
Sample
693fd147a7031676b281c20a5e064cd3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
693fd147a7031676b281c20a5e064cd3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
693fd147a7031676b281c20a5e064cd3_JaffaCakes118.html
-
Size
175KB
-
MD5
693fd147a7031676b281c20a5e064cd3
-
SHA1
090aa9bda342cfc93474bf0e43eb52fabbc6e4df
-
SHA256
70a59979c1199e385db2b1354c1d31bd3fa871573ba09ab0920daa3e90ac2c4a
-
SHA512
97ebdc7ece3c9a17ddb2d04a709fef3e6105a94ab21214f68d86691a9b67f43af9bc1540dee29c75cc1ba49f614e52ad022405931105c8560d0837d095d875c7
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3QGNkFKYfBCJis7+aeTH+WK/Lf1/hmnVSV:SOoT3Q/FLBCJinm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 5020 msedge.exe 5020 msedge.exe 4592 msedge.exe 4592 msedge.exe 448 identity_helper.exe 448 identity_helper.exe 5516 msedge.exe 5516 msedge.exe 5516 msedge.exe 5516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4592 wrote to memory of 2856 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 2856 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 4760 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 5020 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 5020 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe PID 4592 wrote to memory of 3444 4592 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\693fd147a7031676b281c20a5e064cd3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe344246f8,0x7ffe34424708,0x7ffe344247182⤵PID:2856
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4760
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4784
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:3848
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:3852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4204
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4876
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4420
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:3500
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵PID:4364
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:5432
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:5440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5042103823806096118,13730641941847617032,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5feb1955d40ffbd6193e16109879a57b5
SHA1675d81c559c12594300b7fcc25d7b9f0291b2b88
SHA256c51b883e0dcc1bf89b2a0a3e62733b31707b516e8ad51136cf2bda87b55ae6f1
SHA512ef049072b22a8e561d1a5d7ca0ac5053fab8dd6f1df0fcf310c505889de7bd95d9eec05c7685c69db574ea76f6a53c2693a8135c5a17b51dc7b83af336f31614
-
Filesize
2KB
MD5b8bb893f12bfeb1b877e278c796773df
SHA14c67f7bd149956d2ae743df9da95f9dfb81b6299
SHA256935272ff2b73f41b5d6ae4cf1bf22efce3f79f55e56921d021b366f7939e6fa5
SHA512e7c2e39b28522e36030440bf5ca35f1ea2bbe96820be7b0aef734e331b11e9d96fb79e153eb3f2f9ed332a30d7fa08a68913779e32e10df3ebf2f1710f3e6363
-
Filesize
2KB
MD5adb6b7ef32e963e67957383a7618a501
SHA195127568634db5e151509752d6d14b15b31ca065
SHA2562cb3ef5bd8cabb19285b5a25eb5897226ecef8fdd8b22586ce2846a181420609
SHA5121dd7b2627a010e1fb17ad4bf526c38ff2738c51383f23be8aaa0ec30efd8c8bf8e0cdfd7f4a0da4f9ea2dbf04abe36e1417219f9603f3acdb7233d7800940578
-
Filesize
7KB
MD5abe919ee73e47fe46997170d125bbafd
SHA17e5df202c6d0876d642d4f01dada7e63575574e3
SHA256c245322aa0d84f3fbfe600e015e0484dd51078be46e0bbc14c39b715151cf2ea
SHA5128434ddd618e5df32ebae5c896997d84768aa583bef93149e247b3873c5dde710563efb3e2892ad3823532c32e672ea5d841151b9cbda67dfc2d6802f1e7534ca
-
Filesize
5KB
MD59ad8c05bd983ce4f147c902efd2387e2
SHA117ec80d2aa809c5be7563a458e98e8c2f129143a
SHA25651733a355af02efdba868cbac1224221821293b853361db077bdac44a3e286ff
SHA512e1b121fb75b821a436da650d2cb6cdc1adcfeb9c90ffc80c76771da4e9478c870a4f9b1e70efdd284aff686a2c3b3b139e738ce61f2a1cb2575ea70166bb7cbe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cda9b3c745f4edfcf6fc5b8c7005fbb9
SHA14b5ef47fe199e2c4bb3d427a0056e555427cb90a
SHA256922bb041fc12226dad18505dd6a82f7315efaf47c87db82c386968ee1d4fa4e0
SHA512d9a72b22df418f087e85f78dab7e1f330ce5aef61706083c6945ba988e4efddd8d93b51022f22825b7262e8e1cf885f6eee6afc6639ad64948f56051f97a3334
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e