Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
0569d6d9d0d635419992ac7bb80b1000_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0569d6d9d0d635419992ac7bb80b1000_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0569d6d9d0d635419992ac7bb80b1000_JaffaCakes118.html
-
Size
163KB
-
MD5
0569d6d9d0d635419992ac7bb80b1000
-
SHA1
551c1639317519bf2c1410ac214028f6cdc29501
-
SHA256
9c2fcc1ad46d71995b20c492b2fe7d9221fb27661b53dc142eff013121652897
-
SHA512
9c398f6c987acbfabc3e0c84712893559b68ca9e1a859b0f4b54e2cfd489bbe7b6e68c7969bcacaedba83fd2266e7ae02a6e6ff599134e0e10cc725c545d8497
-
SSDEEP
3072:OHRcVhIVs2LQe2U0Dzvj40MZEPjLpUxAfYxslxNcl8CLcXmNRSxrfOZlOF9pqLvq:Gc7J/jXmNRLrRkR8c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 4580 msedge.exe 4580 msedge.exe 640 identity_helper.exe 640 identity_helper.exe 1268 msedge.exe 1268 msedge.exe 1268 msedge.exe 1268 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 3136 4580 msedge.exe 82 PID 4580 wrote to memory of 3136 4580 msedge.exe 82 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 4748 4580 msedge.exe 83 PID 4580 wrote to memory of 5020 4580 msedge.exe 84 PID 4580 wrote to memory of 5020 4580 msedge.exe 84 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85 PID 4580 wrote to memory of 1076 4580 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0569d6d9d0d635419992ac7bb80b1000_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc5b746f8,0x7ffbc5b74708,0x7ffbc5b747182⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6148 /prefetch:82⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,12157432770140262423,17756635428633511057,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
23KB
MD5c897f8479da25ec570027594f1b4db24
SHA181a3ff06cf35a87e697fc4733966dffc270ad06b
SHA2567fd05e325904c9c31e435d5c65b9b4ffa11a9116d1df0282d6cd7c87ef6f1dbc
SHA512b1c1c46810c3bc5c407f7d30a9d74db8242860965d958ffc5bfeed35b1204774843775ae81b8c414ea89322d00d7ab97313965e20cebba588edf13b9b8dcbc10
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5e753687b8f00eccf38023972796caded
SHA110cba95f390090cacbc7179fab6700634b54ec9d
SHA25609272eb80bfb68ba449f136b6e62e1044e070b7c4483d482245d8fbe11e90378
SHA5123d961f795ce64350d22a573b4b0dd1b4baf73a4ce8b02e7c805b4a510861f7fb3e6396d48bb1aa58acff229d4fb977a34c86474e6501f5fd16d616d21a3a5091
-
Filesize
1KB
MD58f4e539802e557c78b79f207dd7e5ec7
SHA18d3d021e22fbf57a00c5f02f9cd15f70a7611979
SHA256cb3fa57f13b2d5cf8bafc4d433ce3fa55e633adce1a58094eae0bd8268b515b6
SHA51294d217e96968465858f9858902c0bb467cf5d9704f793ecfae7de44d9764471e67214f542577218d36eacafeb387db951f3fa16ea40573fb9b3a53e589f846f6
-
Filesize
7KB
MD5038de3c0e865367c775a9e487d09e234
SHA1cd2be60271e70581f1d2cefefc0ba326ea01cc9d
SHA256d480bb0e6a4f2eeb811563bde925789b029a3925c2fd7975d4cb81a420511ced
SHA5129d0ee487085ef3c112762cf04c61e743e2ca6a40f5f3ade427c2b6bff9fba54d0a751840418eade027d2b1cf0ab78486646387208897090fb7be7f52642fcc04
-
Filesize
5KB
MD534efe33e1638f2dca2607d6f15628ea7
SHA15c0ec3a6c78978eca7f68ef902404f9281cd8057
SHA256d7aa9883cf786c8c6c36d31facd672676c55d9d2d46c03914a629629b96959dc
SHA512cbc370655d0b880483815c204e3abe06e2cf5caf534c56971eb223a24d837a04e38b4d1ea98a378c79781b73441b02cd8981d52d99ea822f0d6a568d3c51749b
-
Filesize
7KB
MD54b7e0c416a55dc0abd383ddfc8978cd3
SHA15819d6413e8b429eed05cd77833bb9fecc816f42
SHA25655b1d907ca1031c0fb8dee5a3309c1db6c246ae6250374a0825cf5f16e031e30
SHA512a1435bd088051fe1545a90c536be60ddab29a24f2e8fc56df73a5f06551b917f7541513ae9f56305885007e3c3fef696cece316c0785b3e730b4b28022fbc76d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ecdef1984f66a88e167b75a20516a15c
SHA18e78b7ef65080baa221aa73c756295059f4f1849
SHA2569dd3eb6834e2a281f55ff0c2c9df363d8bba0d61e573d3910e35a39d753494ed
SHA512e7e07fb659c90434783553af3b824e5cd4b0cf9f1f069575c567390ad820363e09f32a66175ef806346659de67a58a6f3805f8ea49f381b6e930035b39d1e509