Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
bfcddef295b7f9346cb079d678fdb51b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bfcddef295b7f9346cb079d678fdb51b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bfcddef295b7f9346cb079d678fdb51b_JaffaCakes118.html
-
Size
79KB
-
MD5
bfcddef295b7f9346cb079d678fdb51b
-
SHA1
c4e7a84926fef1c2ea14023dfd0da9d9e6f2f052
-
SHA256
88c7ab39cc1213a28b8b7748b33d0ab399831f58a8b72467dfc8bd93975785a3
-
SHA512
2bca982194c0114a3f8bc22985fc2d065dad5d4bee038e0b230d6a113afc5bdf64584b20a5844eef4d156f91aeb1ed65b4c84ec995259cb6a690e300a8dc1e5e
-
SSDEEP
1536:Soz7pjNYJfFEau1lUkOEsnqqmMVINIBWq2btogY/:S4pJYJ9E0niMl7gY/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1424 msedge.exe 1424 msedge.exe 2300 identity_helper.exe 2300 identity_helper.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2068 1424 msedge.exe 86 PID 1424 wrote to memory of 2068 1424 msedge.exe 86 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1432 1424 msedge.exe 87 PID 1424 wrote to memory of 1856 1424 msedge.exe 88 PID 1424 wrote to memory of 1856 1424 msedge.exe 88 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89 PID 1424 wrote to memory of 3624 1424 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bfcddef295b7f9346cb079d678fdb51b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffcfc5946f8,0x7ffcfc594708,0x7ffcfc5947182⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:22⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6360 /prefetch:82⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6404 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6420 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1932 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,5175308559326518431,9856079576374332080,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5c79f4179072ce0d5513ceaff622cefba
SHA129f7f38f280bc01774ab5c1d794db1f6f3d48938
SHA2569d94b48cc903a865eadbafe0365af187852bd50f065f7f1ab2efc12ec30f700e
SHA5128799b405b777f4112f1922f090ef0a0e5b0ae88254fa76dee80f024fdd2c3a0468691f4e3cb9587d9e4d93de853514b5e27d0dbb8134155f4a78adff0d6f79bb
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD507b56079eb78af42e739910f03cb0247
SHA11e5d30b064f6e25af69dc4e47bb44cb3255843a5
SHA256398bafebcc8b27a62eb108cf9dd1e5d155f304c7dc7400300bd687b94e478d9b
SHA5128834ffa9dca7cafc70b43cc11bf390d03e5ff0696109ed28b3bbba2281af270481552366406fc74aad2254a2e302edc85d98a4cd1f090116432103788906d7da
-
Filesize
1KB
MD57a9c26860ab16e4f7d1e17fb70657c9e
SHA1adc2441dc03df43ca9c9b8f45f78f55c0f86e09b
SHA256be023042cd0681e8540b6ae8dfd2168d2181154220334c38b1714351674438fa
SHA512098678df073674253f0757d5718e09a1604d7dd47f7a3f780b50d3bab50b383b22144fad178684de7d9821333d7a8d3999378ea0fdb8f63eb3b48d004b221e4e
-
Filesize
6KB
MD540a82b30346208313d7fb16055533bbf
SHA1fa5008586084201a83e5ec90961cc27a3432d73a
SHA256cf7baea80f061d12af9b4316042be45c46b8bb4351456f69eec332858832bc3e
SHA5121a1a5a90dd7fb7051b54f4ba6b6e400f1852108f34ecad4ec2bf99bf85087adae086f1dd7ee09779990668374efb0d28112dca89a256eb245eaf389e6ee486ed
-
Filesize
6KB
MD5cc16768fc6e86ea66cbde1edeb59d731
SHA1e54ca588282e3c64b98ff5afdef59f09501d2be0
SHA25618ecf2a9c845573c4a586a2d1d96904b64fd3431cdb8dd4524ecdf7b21589d90
SHA5127b8c82aa31b853ad4479131118a5be59e73a368796b258cdc22a98f2a49ce45390311c9b7f3b5287854af9e5ebb441dcca875d42494529e28a4bade4b849328e
-
Filesize
6KB
MD5459142626433b69f20b370ae94d456c6
SHA10442785e7c7a18c5cf221877fdde0e334e244ab7
SHA25674bbbc801be8cf6b00ff3a25ab861af5dfb0859791f088abc188fc1377d9170d
SHA512cec512379644ba2c5563ebb9f9e4d0d98ceb459f53a44cbbef486b05174e202985a31abb24033eb9de0ca9c27372a5f66ce4838b720b9c2c43e214f0f7d7e278
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f560f98de79a76fc676748067baaa922
SHA1788d0a58473f6d9173ab267eb4d518643ac103a2
SHA2569996d2228c8db5623d3716f127a17228cb1b63464d5462b473b413ca90bcd543
SHA512eff4b92dc9179dc080df20dd98dd92bf2151b92133f3a6e8653129846bcb699609af26f5c7eb83807603dde3f5b91f95a63133ee81b8f6ce04511fc7e021703b