Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 01:04
Static task
static1
Behavioral task
behavioral1
Sample
eec74ddeeae3901ba27465e964e5cdba_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eec74ddeeae3901ba27465e964e5cdba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eec74ddeeae3901ba27465e964e5cdba_JaffaCakes118.html
-
Size
80KB
-
MD5
eec74ddeeae3901ba27465e964e5cdba
-
SHA1
9b3b8f852b42ca42055a7896322f986122ed913e
-
SHA256
5827c50d03ec8cc1672024f1b6cafa1ca3333800c8abe1bc59107e06252760cd
-
SHA512
781d8fc5a1184a8c530af47eedef2a32522a339144ac44e9bd70ac988fbb0e99fba888f6ba7edeb4ea4116daec0215395d04a5b5f5880a1c01a5d49ec25605ed
-
SSDEEP
1536:ZpOdeLeeqeHjer3De4ec4eCEZZeAeGe3euCexeLeHWeK:JMeI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1428 msedge.exe 1428 msedge.exe 5068 identity_helper.exe 5068 identity_helper.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 208 1428 msedge.exe 82 PID 1428 wrote to memory of 208 1428 msedge.exe 82 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 4460 1428 msedge.exe 83 PID 1428 wrote to memory of 1408 1428 msedge.exe 84 PID 1428 wrote to memory of 1408 1428 msedge.exe 84 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85 PID 1428 wrote to memory of 3604 1428 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eec74ddeeae3901ba27465e964e5cdba_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc66846f8,0x7ffdc6684708,0x7ffdc66847182⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13428762925441986010,10950384075932442621,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,13428762925441986010,10950384075932442621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,13428762925441986010,10950384075932442621,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13428762925441986010,10950384075932442621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13428762925441986010,10950384075932442621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13428762925441986010,10950384075932442621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13428762925441986010,10950384075932442621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13428762925441986010,10950384075932442621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:82⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13428762925441986010,10950384075932442621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13428762925441986010,10950384075932442621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13428762925441986010,10950384075932442621,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13428762925441986010,10950384075932442621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13428762925441986010,10950384075932442621,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13428762925441986010,10950384075932442621,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD540a270284169f85768463a17f84b7c52
SHA10f81af55407c2776b5e6a4668134d1901f1ad30f
SHA256eca4a47bb6a7efd72853a8eb8c2e137c7ec88f6583694f5220cbf167ce7fb839
SHA5120d9d79bed87ed29ad3f12722b618cf5cf68d5282eccfa38b8386fa2f23d089342e2325c5d84378f1815ecf1f93b8a1ee3f3323316cfe1bf51c2e15a647e5ebc6
-
Filesize
2KB
MD59aa892d1aa0250644d590b699226d242
SHA172b03749d7628886859f40caab62b91d62fe219c
SHA256d83b2d7f3f987431590c3e8ee92c5c60adf1aa6354a985e41fe2c98601ce9c72
SHA512f7ee3e23c0d7c0d695761da2b74b6445a4e10a7d60e3d08eda0acadf5bdbde024410ec4e1ac5c1512b291f3e16078138ef266b17082816eedffef3da4d5e3552
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD50339c87a955e27c69a2728d5e103566d
SHA1cb626110ccdde0cd8a4c3d26001e4643c8426d51
SHA256cccac4901cf09992ee7ecc1c0a569f3e8ff1e328855d18b5ba05bec1f42888bb
SHA51215406ad9d61cbd6571b6a1f77d65fc9bd200ff267801ddf4be3905258142480033bbb6d1c00f07a6b66a5bf75236b4ffb43fb3786d0b44e2775757337cee5470
-
Filesize
6KB
MD55fe3ae6e5b41515a305c3632e2a09f70
SHA1d5e2dd161187e553070cdf8c7f84d0bcf9d66857
SHA25655b03db5dd6ba5e7e81808850e3b6241b3f40da75e97324bad9ca9d9d1fca8de
SHA512f7b66bb47aec133cc87f9da5732dc5357f46a13dac7d0a80405975847963e5a9083cd3db024e39c08c313565781ae22463e9b483de4643fdceb58ccc76b2ddc7
-
Filesize
7KB
MD5a2f751f11b16031ed480bcb9f3103bee
SHA142ebb7c0452638b2741d7104df5090fe71ea46c8
SHA256c8e82010a7cebdeadec4d8206f53987f6c18acabb7cbbf79eaacb217ae964293
SHA51299b3b5937d904fb79e12dcfb37a4fe4e45a5e859c054662917fdee842d6026110c3e7d1e92cff855189bc61d652320f7e5f315e78d66da5c421f7ea80ba403ae
-
Filesize
874B
MD51ef195c9540fb0e73da011fe7359ba5b
SHA1d93a3d8a940d9278c4657ba1affb71d568e01751
SHA25638125fbf86a703842c87c285d622597ba6530f1cbe630ce2d08d1db58f993c18
SHA5120af055dc2a32431fecd6986863fa11c270a2de4c90190e56130a5b15cd951d41936b71b5425dd2f2ac0f3d7439eda7b3496bc5bd070a8fd558545ef0743fe03c
-
Filesize
367B
MD571f909fff5922f65a5952929d3547ba8
SHA15c8efbf798daa909fff9d01362609ff80509d6b8
SHA2564bc9677a3f8bbbe5a64ff2a3668ea6af97cf984d2e3e6b2be60ac075264404c7
SHA5128e7249f884bae6ffdfad7b8eb570cd8b09da6ea2af056a89f81999e5c994567d165ce5ab60a0d14a909def613d7db2c5a37c7b2fa1da999e0b1101b6b79ead16
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5409939d64fbe141cd380c6097f86516f
SHA18e3f13cf714795b28d88792ad1fbcf4e84be8942
SHA256c60c4b5a1dcce3961eca2a3085eda1e4c65b4765e550bbec2a2238446e749224
SHA512d7134792b94b95976af46e1abef8705eef79181b79bd295b038414ae684974add595b7c3842e7d145d1f07a1de9558a47b79c4f38ca11dd85f0eab4747e909eb