Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
d9e304a6cb56d500db41318c7af542ee_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9e304a6cb56d500db41318c7af542ee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9e304a6cb56d500db41318c7af542ee_JaffaCakes118.html
-
Size
56KB
-
MD5
d9e304a6cb56d500db41318c7af542ee
-
SHA1
8cce83bcf679ef9d90e9decdb3f39e5bf13ae1b8
-
SHA256
99e68a121636640545c3f760951534c62f850547bf191ad9fab3989ff6a61af9
-
SHA512
faf9145b07f68cf0989c84805a0ace521240d3ad4a506470dde5bcf650665c72cdb486d3db819e32e138a320b89348fdbef7ac9c7e355b9f718e857acbdcc89f
-
SSDEEP
1536:Hz7+HbVLSmpBaGnLXgbTTn0fWEuPBGhB56rq5wKJO+D/MB1kDg:HISmpBaGnTgbTT+WEu5GhB5H5wK8+D/a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 916 identity_helper.exe 916 identity_helper.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1524 wrote to memory of 752 1524 msedge.exe 83 PID 1524 wrote to memory of 752 1524 msedge.exe 83 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 8 1524 msedge.exe 84 PID 1524 wrote to memory of 3964 1524 msedge.exe 85 PID 1524 wrote to memory of 3964 1524 msedge.exe 85 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86 PID 1524 wrote to memory of 4156 1524 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d9e304a6cb56d500db41318c7af542ee_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff07c146f8,0x7fff07c14708,0x7fff07c147182⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6892 /prefetch:82⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,8291867457488654003,14747157668222021748,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5416d9cd39bfe9f22cbc61354ceb64d6b
SHA1690796b7e3444a2396500486c7422f5f95ad0514
SHA256d20069c6f61df11b8811d30eb2fedf25b2cb4f110558f3c41f8a9695533044b2
SHA512748faf71752a7d25b132f4e5f22424e04175f019ad58e418bd6dcf6c75938035cdcb335540e735875b643f9eb2ed601c2c269eb3076af417b1036c17db509e7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5e1cec3a8ab4305f475c1dbb63202be70
SHA1c87f4c03169a956477f5203cb12743dd4e392b2b
SHA256734787db041aaeeed9a7585201ba396c51756aeb150b784c89a3ee78f36192e1
SHA51279a306af87a004e96014065864db0cf1277031127c2fae7f1de0c6a94165afc24b9e13d2803d3b05a38daebf6bdbf7769bb1ed46523c12a53cb5c965cf190337
-
Filesize
1KB
MD5785877cb96b101c8d1df06aabb9cf3f1
SHA1b70eb77e58db1cdf5da2a0070139fe0a874a9eb6
SHA2565f276a1ccf2f4427e7040040a259b75632d7c045e431ac0abbeaadd07fef5bd6
SHA5121b10139e3cc5872b2aa737c0075e56d3e5df6e4c1441eb8716db882250de598fad513663e9c87c34e5bf15e9d72b43fb192e4c58dbb5f8fbca9d7a574975f8df
-
Filesize
7KB
MD53eb2c1a9d8470b3f4a604bc4c07b1467
SHA11a553995ad1b5fca8526fd188133e5abdeaf5bb3
SHA2565bd6a761b80b873a41e73259b971fa3bdcd53e87ebec1b0035eb33041945efc2
SHA5127e558a9729af6ad8172d59fbf4ecab1ac45e2ac6e347819c17581dec1eab067f9c08dcf1fd3b7a99f4fe748ddf021992da6272ccc51bb3f43698992669df92b0
-
Filesize
7KB
MD566309e236ee595f8ea6e3ae9cf972cce
SHA15f6e6adbcb61f55ebf454e204ae10a8d59b91b73
SHA25673b5816e7f09c655ef4eb0a16b98f3ff91702a612d52a47990c25b4358df1651
SHA512b7eb37081b5bb76fc729cd02e6d4bb502ee29ea4b2333c2dfd3a951c46abe59c2ebaced949b7e934e71d65be3264532a7028fc9e22779d85955469ecc59fb831
-
Filesize
5KB
MD5c59e763d064234686b3b1934cd086b37
SHA190cfaa54f391e15e86f0b44f11d02976949a2409
SHA2565bd6cc2b7468e4157eb96b265206f2b16b457e8fef04d55c36f969bcfa89576f
SHA512e190c6e54899157b95271a2c705a1a6c0335e46eeafd5a3ab120407769ab6ebe12cdb6214b5e0d248d198f2a2e444faa815e43643c089ee6168651e5b0c11529
-
Filesize
7KB
MD524116927659dfe8a60589c23034e1524
SHA17c87e21ad4a74ae11c6d9dbbc66325bb273895f8
SHA256a12214c3a36cba77f2072f5176c432236ca5363287267d341ae1eb808168e19a
SHA51225b651a22239a3ba04f920d22a28d3f1864aa65676d72a46b5e712d60c7716894e11888ff6da9834deacc867c499c99e6d346673573ca8c58200ba4a3ba8c97c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c5ffcc2e2fd2ed18022af7ac73002833
SHA1e802291b4e364a8e73666f44f5a789655a42bd20
SHA256b596b3728ab664487d37fe3ccbbbd4783cfaa57cd00203ea25b853664f15a8e1
SHA512989deb7b987d877b52dc8f2f317727f6312b1879830333c3a755bc90d1e7d2ed7c1a57818912adbd116bb93f27f1c69dd5cd2c84b017ffbc79a4866509b6c0ae