Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
df9460ae70747e5785badc798f6f5ee3_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
df9460ae70747e5785badc798f6f5ee3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df9460ae70747e5785badc798f6f5ee3_JaffaCakes118.html
-
Size
37KB
-
MD5
df9460ae70747e5785badc798f6f5ee3
-
SHA1
fb9703ba93589f1ab4ccbe59dc3d0fcff8811350
-
SHA256
2819cd7104888ad028063e8ae2c018c7752c2efcc0d6ffb4a378e8e7fa1df96b
-
SHA512
f3f6f1eaf9ea0a944c209d750eae4abe516a00ab793b95a6b5af5b5bfc08d08c0cf13bc5b1a01e89590d98a8d5f36402d46d2339f689594684dc5cd91bd3dae2
-
SSDEEP
768:SKC3XB02fCVCICICZCZCXCXCXCXCqCqCeCeC5C5CUXPGYeHpUb:SKC3XB06ENNgg6666tt33mma/pi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4780 msedge.exe 4780 msedge.exe 4388 identity_helper.exe 4388 identity_helper.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4780 wrote to memory of 4248 4780 msedge.exe 83 PID 4780 wrote to memory of 4248 4780 msedge.exe 83 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 3232 4780 msedge.exe 84 PID 4780 wrote to memory of 4784 4780 msedge.exe 85 PID 4780 wrote to memory of 4784 4780 msedge.exe 85 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86 PID 4780 wrote to memory of 4716 4780 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\df9460ae70747e5785badc798f6f5ee3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd70fd46f8,0x7ffd70fd4708,0x7ffd70fd47182⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:82⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,8740601223476170321,10638985434391484484,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD579ea90f696284c00db50987ba3d82612
SHA1a3531b94282a2862a094357849a47034a7ceedff
SHA256636244bbe7a11482260aa74b1dc6e964446fb7ef08ae1599b49c9782eb5777b8
SHA5127f36236668905afc858298aa9910335dba9932fb6a0375cd6991e88ac39b4442d10e685dfbfa01bd138613867e4403f10f6c4084d59ae1c4204ced831d8b126c
-
Filesize
2KB
MD564a5eb92d609b451ab73484875f3b494
SHA151fe7440187a1d5f0b2a9c379383cd150b0d0f93
SHA256f70b9d0e63b3b86ebb110d08420328c38c09e4fcc9db0c8914874c7a6dbf9a5b
SHA512e358ec6ed66bf9ec44ece1ff0c29a97d77f8807e0c2f37504ac777fc06790e55f053e4595b970299a5681e61a662eb8da9f19ca9dc19c9b86421ac8f55adc197
-
Filesize
5KB
MD567415240e7c66f4caca91101188e5f2b
SHA10bdadb82ad4f49476869bc7b14516d242ddb00ca
SHA256c6b70e4c335cb646f9f3c250ac437d05e0413de68fdb9ec1f420a7ca4d8c5655
SHA512046967c34ce85253b7530a20b358de5eb5d56995448c2d51d023725f514c5b3591f1821bc7d2b337bb317a65f5f1fd34e86444c3588ce1a5960c6d50b95dc2a5
-
Filesize
6KB
MD507f00a1f2fcc47d4d8b5508963ff34b9
SHA10d36be84967ee11d3736bfc5651bbedc67380437
SHA256c2e16098198a79ed23472f22f34552af86275135341cc283833061e2229eeaac
SHA512fdd183bc3b85115c9e20b829b622685e6bc4b18b871db3d6418b08bb18b3f480f5962977aaae5634295d907fa28e6b319e8a0cd47143542e96d6bd872c0f1f34
-
Filesize
6KB
MD510344dfee25594272969ce815bd637ab
SHA1c19f40aa3a0ad0f2546a369636d3a9cb58d65001
SHA25638eb1cf54c750cc3193912425ef122d75efbea569efbcf377fd2ff855a83a1b0
SHA512c951039891f103ae8b6ce9743c5b1a4a79d2b9b51d8d9e65986b211a06c8095019cf2a4efdddaba8a2eac32ba55e38d632bfbd5e0e405669b1315a66ba542dd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\32cadb2b6d359d069dd3f3d132c212a43d223701\index.txt
Filesize99B
MD56ee6ce78e407949402ca253401b3cac6
SHA1fc697fadb4e21c4146284f25d415bb1b7515b7f9
SHA256c5d9e08ae714869d08a29a6bc83ae0a7edad4afa884e404e11a58d8ea4a12a52
SHA512b3ca85c37855448aefd34a82b64c7b315d71a7adbd5d58b4d3351fa8ea63e42203aca8de65b8bc72544009069ea0030c9de9c2e46c5d343f3a8ff16737244dfe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\32cadb2b6d359d069dd3f3d132c212a43d223701\index.txt
Filesize35B
MD5343859b4ad03856a60d076c8cd8f22c3
SHA17954a27de3329b4c5eefd4bdcb8450823881aad6
SHA2568c79b653c087618aa7395d5e75198da7d3b04c08654c39e56b1027f9ef269c2f
SHA51258014a4e7f2b4b0d446fae3570196b8fb95d0d1b70bdab0dd34a74d6c62cd8d7ca494a486f19c1a829988a3af83a08d401f18d1769ce1799a02ee09807234254
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d29ca7e89d8d9680f6718353d75d3df2
SHA11bd58fcac58458abbe3dc4b97b67ed4a7dcf625b
SHA256e4643e9b44528350754d1e404a789fa2441eb5d115eaba5a3a030e600ccbd5de
SHA51214e2ee4c40fdbf51efa9ff9588b58fcdf38571be1798f3534938f171de5fc909ab8a3045a02fa4e7e97d42dba56892677aa0af00c4518d8d7aafc026c246a0a0