Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
c2c02c4889a8583baca06ff18710c1b0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c2c02c4889a8583baca06ff18710c1b0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c2c02c4889a8583baca06ff18710c1b0_JaffaCakes118.html
-
Size
76KB
-
MD5
c2c02c4889a8583baca06ff18710c1b0
-
SHA1
da0f20ad0e75c397b6cf276769b19b8bb3db67d0
-
SHA256
30f306d7787bbf46c24eed30c25f238dc942eb3c6d22a30c2e3cd75b5591e27a
-
SHA512
81e2ba25a7a7b83cc4895044718dd06a37c196b35ab81dbbf51dc66a3ec9bc83c5863c14c4393c60050f912db77b81c05f62481a5aff6b99a94f5f3a87178e00
-
SSDEEP
1536:K6Ob+x01a796r/zVe2lFxTsndcqCm1uxlrdq5:K6OSxMa796rLVe2lF2nuqpuxl2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1300 msedge.exe 1300 msedge.exe 3236 msedge.exe 3236 msedge.exe 1132 identity_helper.exe 1132 identity_helper.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3236 wrote to memory of 620 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 620 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4192 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 1300 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 1300 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe PID 3236 wrote to memory of 4692 3236 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c2c02c4889a8583baca06ff18710c1b0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfff146f8,0x7ffcfff14708,0x7ffcfff147182⤵PID:620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:4192
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2400 /prefetch:82⤵PID:4692
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:4576
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:5076
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵PID:1284
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:1936
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:2704
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:4780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,7600889352658496799,11438294367945666965,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5a848a0148e32de3a0542ce0b165f52c6
SHA1376a3bce4d6577c389c26f0c27ae40fefb2efe0d
SHA2568dbf2a648a5dccad9705eb157fa030a41d3c6ee264690fe963d73477fddfde7b
SHA51248a2e23ce9dca6145da48eedc967beabee2c12d835765d885f324c28abe460cd3b970e946697440f1c49b3d98f4b3d7104892527cb4445f246625164c902c1f1
-
Filesize
1KB
MD5e7fe0fda64291b88e8c8c8a1c389ec2a
SHA114434399802892514f359dbba396facabc1b24d6
SHA256df2215fd04bf3807bea80827678a91b52f82ab29ffe08d8235ad0bdce4225863
SHA512b66fe5237653052b9e7a20c19331bcd46e11fad77abbecefeee3fd0cd31849b0566002280659b9fea075a13d10e4672b2c1e0732ad70f946626fbfc8e05ea9e0
-
Filesize
2KB
MD55aaa7c8cd176b29bd5beb840cb4f281a
SHA1efad055fc5e6ae62a17a8aa58fb4b217eab50b73
SHA2568f0ff45185eefd04d6b6497b725a9fa61b92ec80532acb4c8a861c8a7d38fea8
SHA512cf397646e8a6ae8c0e0f0534c095458436e42142ec27f084af220948e955ce3d385964743d9ef7d132bf9a3d8498b1af171841e0e70ff19bf38598fa1438bf02
-
Filesize
5KB
MD5f99700d9374716186befca0b4efa838c
SHA1aa27d98b8ffbed6f6fd9828f7858361a8d5e794f
SHA256ea8e8dcc0ac1482d4ad9bbd3ec914a3bad7831623c62753cf40f96bf18855395
SHA5126a84947f5cb7ef139e1850a17d4f39967d8118025054197f0c542c2146430abed89245f4093153c1f69512cd086c7b42985b880083e6f4c60c3cb1d8a8e3c41b
-
Filesize
7KB
MD551b0bfec259cde30e50c9f8420c7e16d
SHA14c6154a67e49b41947893be4743d3bb4b4c5ab76
SHA256aac03f8fc7445fe92c065a26488bfafa4e15b16278999b4251b846d698783372
SHA512d313acb2bf5be86c0677d0b13b6c52df05cc9d4ff8ce614e4650742343ef67252b8fa49e74242fdda35fe4ffcb7b06590993d74279a008b383d6710c40adc2a6
-
Filesize
7KB
MD5f1a157c099439aab1da5542030c13840
SHA1c0c55cbe4c85606a619c2a16d3e509c3d14d572a
SHA256bbdf8aa2213ecb0e4ea9890c2212dee81591458979960b7e3d15f3a2b80e2e46
SHA5124078c3766690b670fa4013526c060ec318629002be9b1fb4e356c418cb013d388aeb8e3cbdba90dbd3da9b1f17bd3dd10f3624c71dc51b7d247fc98dd76c6209
-
Filesize
7KB
MD59fa7b5c36ce9af0a481a0506efa425fa
SHA145b19e786b7967059193a293e3bf75aafee66feb
SHA256087224fefad74dc460d10fade2d4acfc1514a05289ca7259664be3abb270f517
SHA512fe6de50a85f8d5017170cbc6f83fa3d0af88c8501edb8948bdac6d96b3c34ec9c2b955a52da9a0c6f3c783ae38a034b59947d35df3211acc64bdc7938271dfed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5483ce14d58ed5459326ace8bec572cc0
SHA1d543427bc00732541c7e72809e09ac2a6f365073
SHA25655fa378ab079a7af573ae9be6fc55643034d7ad3c508116eeb8dd3b1f86e28ac
SHA5126b76dd304c9b726e6230c6dc44abf1f944633effdc7f7a5bd7eb56bd21bac78e2277670ce543a78ca203fd65c4bd476220117de3d162ead1ddef6cf1cd8c336a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e