Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2024 13:37
Static task
static1
Behavioral task
behavioral1
Sample
1db912a4610f8dd179f82f66eca87dec_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1db912a4610f8dd179f82f66eca87dec_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
1db912a4610f8dd179f82f66eca87dec_JaffaCakes118.html
-
Size
122KB
-
MD5
1db912a4610f8dd179f82f66eca87dec
-
SHA1
9bce1787699fc0f5346e46bff1e1be9c0754935c
-
SHA256
3441601350acd3682b8c1a0c113907209c4a7b6b6bd3c5e64a75076099330937
-
SHA512
0c5c1e0bcf399f0d4ebb8f2c1ad94d29b48cee124b0b2c5cdfee8d06801f0ac2e3fbef18cffa51b7b123fa5c80e798e007bd73001bf95e8388a588575d9485cd
-
SSDEEP
1536:+gWVOkV8QodChi3Z0LSCWMoqoZu+La4yGx8gUtxdXf:+xrqQodChi3OSPMoqqvzyGx8gUtxdXf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 4272 msedge.exe 4272 msedge.exe 3208 identity_helper.exe 3208 identity_helper.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4272 wrote to memory of 1656 4272 msedge.exe 80 PID 4272 wrote to memory of 1656 4272 msedge.exe 80 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 4612 4272 msedge.exe 82 PID 4272 wrote to memory of 2524 4272 msedge.exe 83 PID 4272 wrote to memory of 2524 4272 msedge.exe 83 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84 PID 4272 wrote to memory of 4500 4272 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1db912a4610f8dd179f82f66eca87dec_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff86db546f8,0x7ff86db54708,0x7ff86db547182⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6920 /prefetch:82⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6924 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6352 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,74559859017971180,6990643275383328947,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5aab67f218a76bf0c58963f7b46b530d9
SHA1149fcf95539490087fb10fd59e3e95df6b5cc67e
SHA2564734b5ab56ae332bb95296fc2e9012bc4fe78bea04466fd85e19f68a3f58f9d0
SHA512bc318a0e184cb15ac3d113792d06de14ef7f9a4cce6054d8df262aaea5dbc2ca4ff40c5e949c6c4fb7da09f7458d095135a0d154b40a3d5b19760cc4638190b8
-
Filesize
1KB
MD562043e47a90ae3b1cf1ce942b8b53be6
SHA17d7167fdc56db0ffefef870834115d501c5d11ad
SHA256077a15f29b907a11e8966b1eb3cc7239668b6f06144e9e242fc716399ca19fb2
SHA5124428456ce6a0207e1b167c0042ddc481b62f7d627c21d8bd31b28b1560bb68a65c17db2f61cc759a1a875e4c34f6c0a8771dbeb775f0ba7ade1e54be95d4332c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD562eca122145a20e359b2db5413e129c1
SHA1f010b620e5fd141b79e3fe868bad4a7ea4e716ee
SHA256d3c528566414b9b3df77d4b51a11884dcd6179cd03f27664d2e81d4cd09633a0
SHA512af3b9344f1c2a78365a62aaa772162573eacd45dfbc7fb2f2138108c1f657b46c2dc0786c6957de837fccf4e3759774f4d45a92edf13497ff87f251befb4f1e7
-
Filesize
7KB
MD55bed65dd865fb762a23763a891c9772d
SHA140b72b8aa77750d1b703d61de9693065f40577a2
SHA256d1b974201a01977f893fcb9c44f70ddd3e152e1ec5c4bd155ee204cafb1a9280
SHA512664a86275b50fe3b38195843d57eb20967690046095e14037fd51c1caa15ce2fab53fd5ae3a1bea10daf77f8a1619dbea31d5cb1a35c32ae3c0b379d87f7e9b0
-
Filesize
6KB
MD51e92d1727a19b7ae0a6a8aad7a2732cd
SHA101fbc10d7b8b06a7fde6917d5a64f28addd201b9
SHA256479be4ba69f595836cd1b4b8479dca95a5d16d7c3561eb4a6fdd7c9cb1341e48
SHA512234488cc1179ce64712ef2f7effb31c076ed34f10f62d1be33efac2e63f50beafc81e04b4d80ce3dfe83b055f054b0747cb03f3307f17a0aab3a364cdf9353ed
-
Filesize
7KB
MD589f7b527b1715229943a39493d85203a
SHA1c5db59457bb436ebb22adfbd0e4c27611e579fcd
SHA25606b10ef0212fca286f722ce1573eccd855e748ff535992ce63337a318d10cf45
SHA5128cc25fbd8666a020f52e3905615af2bab28aba8c82c8b14cf4439329f1faf08143be3e95fdc187a83700bb04d8fe1c9f7c7a2f022383ecf4c35f7c6ba5c041ce
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b0ec9bc86b8c5239ea088c832e58c96e
SHA1c01f5e0a663667aecbd04b5f07fd34f6e746dd05
SHA256899c7c7832c98a4dd7927d642a5b6df08528d66e32960931d8bdb57e60b7325d
SHA512bea661f556c0e68b4fbccd6313abf356c06d836d031d4df1d9bee3d374b2d94ef642d5b64c1dbf5b0ebb5af6d83ebbada53a1b7cde73c68d7eb748271c3eded3