Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 16:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_29b936c7a4979e6e28e51932a8dcb17b.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_29b936c7a4979e6e28e51932a8dcb17b.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_29b936c7a4979e6e28e51932a8dcb17b.html
-
Size
178KB
-
MD5
29b936c7a4979e6e28e51932a8dcb17b
-
SHA1
96db8cf8b25047314ea55f485954e0b85662fb27
-
SHA256
81763f5e30c6e0be3492e3a9cb567a07ecc8324cbeae5c3d4bbc122bb8993758
-
SHA512
6a2b293dc33f927c5bee369ca97cad04fc0d866e4a08b154a36299731451c79b771176822e5cfa30f929f7957275a67dd8735599b47c81dd7cdd6ef0050914c0
-
SSDEEP
3072:RxDNvG8rm/GXmNJUNBVT7QUe+EOf56LIBg5cbbb/tY2Fqngw1/3Ru:tVXmNJI5v
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 5072 msedge.exe 5072 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 1484 5072 msedge.exe 83 PID 5072 wrote to memory of 1484 5072 msedge.exe 83 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 4196 5072 msedge.exe 84 PID 5072 wrote to memory of 1612 5072 msedge.exe 85 PID 5072 wrote to memory of 1612 5072 msedge.exe 85 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86 PID 5072 wrote to memory of 184 5072 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_29b936c7a4979e6e28e51932a8dcb17b.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0ac646f8,0x7fff0ac64708,0x7fff0ac647182⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,9875555891264629553,6812358186962417109,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,9875555891264629553,6812358186962417109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,9875555891264629553,6812358186962417109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9875555891264629553,6812358186962417109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9875555891264629553,6812358186962417109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9875555891264629553,6812358186962417109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9875555891264629553,6812358186962417109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9875555891264629553,6812358186962417109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9875555891264629553,6812358186962417109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9875555891264629553,6812358186962417109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9875555891264629553,6812358186962417109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9875555891264629553,6812358186962417109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9875555891264629553,6812358186962417109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6508 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,9875555891264629553,6812358186962417109,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
20KB
MD52ebfdbd309ee762211b4a2ac39708c4d
SHA1b002922c672dbe1dd4caa02af24d0b1e7da616af
SHA25654ae97d445b166859fe3ba6241b97abbac0aa0d158c72352b774d60ba3e81797
SHA512d1687b7a6da07a72963c96a1e85661046d3d3c96f88445302afa09721fbe211a5fb8881ff14b346b0ebe8a20f5ced21979e9f58e256427e57b85d565bef17720
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD5b72007bdbc55bddefea1aaefc9f7e093
SHA16612997ff156e9b2d578021e0966688a06da2d3c
SHA2567e946b4ec8655cb2ed70d875355bb4fd5cd36506b57bcd13e61ab80cd21216a7
SHA512fd1fd5d665ff382d0f97d5b8a395bd51a08488c3d57b9350ebb84f93f2ddf29a8d9689c7b272680650ab5ccee7e8ba05988517f2995b9c9962bfd5b79ebb9a3a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize720B
MD5f667d894d771bed47420d28273c5a5fe
SHA1307f4dad3138fe92017ccbe67ff4d91456f232ae
SHA2562bc1c5a6a9799dba838146dc104d3c239ff63d43d863dfef89996fcd946297a3
SHA512cf8c2dfb204ad8a469fa7aa58530af5fdc16b71bab130cb25d752f0a722c8d45c983b1021ba622fe276b61edf4861155c3f8242f87e6996b5f75c04cd82a5ff6
-
Filesize
4KB
MD59f60b3b604a77cc08495a199c5cddf91
SHA1d5c5d0ad839afe057455400f222810d6e034d473
SHA25689162e3433b1787307da06df0904f3667a7853c7fe650e95f4dc8637249ca7b1
SHA5122d6455e2226ebae77b75915e1b7e5362fce6d3243afe9b19d1a8ae3d3aa1a84404a23d11be8ba328fa46b896c9605ba138498244d36490ad96579cc415886f1f
-
Filesize
4KB
MD509c7c10b19f2f90b8763e7e40dfc84b2
SHA1be2ce5ff5ef0d960aaac7f703e1988bd410fe656
SHA256740721c9c655b5bc1250670d9a4c6c053448a75c87fa86e4126363f5b619a508
SHA512fb81d731cbaa6560dbe829fcc38db4eea5bf40814be270b2c304e47354818d36732a51f0ca9efb06a60d274a46aeacef1b90d1cd04c47ddc2c451a4998ef25a5
-
Filesize
8KB
MD5147bc9c8b98a7ac7333b72d48d85c7a6
SHA138b9128323b4a13f624ba88444e96aec521c0653
SHA2566acb01534cd37b17fc1cfd93af7be7fb84e87b7fce13b8a4a10ac0ab0557c437
SHA51219524f78cd2ef2a7f8e222fce9ab6c97cc73c3f83172ce081d5ece85d650068b0968e698a168c05a66bb51c25f3165b975480ae1b92bb6f3a7c36a57ea5cfe7b
-
Filesize
5KB
MD5c37631ed4afcef77cd073eb1430029f9
SHA1e9562a7dee1ad6a6581700f40fb48144c364456b
SHA25641e30544c4bbfe35bb80bc2cda836f3dd5cad1f2241934a15dbc9236fe722573
SHA512927ebf42f5458ebff93c75abda1ee12547acde4dfbe24c62738873291122bb7eca80f16e0f14333aa9e9c9bc199687bc4b0c17efb2115d7723dfe0439ee9e62b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5d0a50020e4d8c905a5347117951a93da
SHA1ab40c5c3068951ebce6b152c47432bc585da293b
SHA2569f8b01e282285807e46b64dbad1a1de76615ef612bded4dda9cd98fc971d1d3b
SHA5127a35300beb0be19ce88f78eeba78e795d457f6ca8d1e2c92455bef2838891ac7eb67d069e388cf8ec6d5433662f42445ea1c19f4dcce2e4bdc37b4a8a8168c73
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57dd02.TMP
Filesize48B
MD5613c323913cbb839763fa071a0ce2721
SHA13fab0734df3adfec97a894b87803187f11fc93b8
SHA2561588c4f69f9fd0a5cf5aada5092f2bc9eac7bde895722cab4102cc9f02ec3fc0
SHA5127f0c3558d8f97329479309f16b2b6c4f6075039429024b4338e38f2d047ce3d83358076c7019997ad82c5415ee851a587957c496f01e41f992428ab9e2699e09
-
Filesize
10KB
MD571ecbf160ebf483b174a58d4997e24e1
SHA1687d4573c2b6df85b80bd8b203fc8f0bca137fb0
SHA256f0a79d929a19f4f690f740ed0a916f879fe9446e8c4b452fb5869914e1947012
SHA512ebbc47439a6b4ea7eda911c6cd033e519225cb621f47f3ac377062aa8a79b78a27989899e2abac6aad85c289132992fe8e4921298daec6ddec6251a912ee5d1e