Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
44ab067b9b4afb0d395504034ef763da_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
44ab067b9b4afb0d395504034ef763da_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
44ab067b9b4afb0d395504034ef763da_JaffaCakes118.html
-
Size
81KB
-
MD5
44ab067b9b4afb0d395504034ef763da
-
SHA1
cef95e1772e6e0d025c2f1fc2ab3c4653db30d00
-
SHA256
91e1937342fe56c40de5eb5dd401c780c863c0ef4898181c67c5939569b8de54
-
SHA512
f100222a8a941771d50ee4fb07206397819f701305598d65f71fac4f9e4a0f081a2599578fae432dea3f016f3e1f8405c06b886adc7dcc7a19507ed10bcf4632
-
SSDEEP
1536:g0dY20+ZAAkdnm4SizgINx2kAT3KL3FuDqyMQnm4SwfCJ9IzIwBUYnm4S3nXTUT/:gW0FAkpx2kAdfCJ9Izz0nXoauD2u6wWS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1828 msedge.exe 1828 msedge.exe 3692 msedge.exe 3692 msedge.exe 3708 identity_helper.exe 3708 identity_helper.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3692 wrote to memory of 1108 3692 msedge.exe 85 PID 3692 wrote to memory of 1108 3692 msedge.exe 85 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 3628 3692 msedge.exe 86 PID 3692 wrote to memory of 1828 3692 msedge.exe 87 PID 3692 wrote to memory of 1828 3692 msedge.exe 87 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88 PID 3692 wrote to memory of 4868 3692 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44ab067b9b4afb0d395504034ef763da_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf44a46f8,0x7ffaf44a4708,0x7ffaf44a47182⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1412406484524761552,1659162202930785731,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,1412406484524761552,1659162202930785731,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,1412406484524761552,1659162202930785731,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1412406484524761552,1659162202930785731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1412406484524761552,1659162202930785731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1412406484524761552,1659162202930785731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1412406484524761552,1659162202930785731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,1412406484524761552,1659162202930785731,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:82⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,1412406484524761552,1659162202930785731,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1412406484524761552,1659162202930785731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1412406484524761552,1659162202930785731,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1412406484524761552,1659162202930785731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1412406484524761552,1659162202930785731,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1412406484524761552,1659162202930785731,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
20KB
MD5397383c90a2d930f866f405747e27466
SHA17bb6b5d6cee104c877dc5c3462f61232ffe5b360
SHA256a67db01d19e15d8fa76e5a075e336e195325d79d277a83aadb6a440acf887c47
SHA5124357eddc0581e3cd6209646540bf59756cb4035d7dba47d5cb6b0050e6c202bda65721d4e9d644f37e3cd105bc5fa240574cfa96649f01e2769b796b523e08aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5d2a9c690c4068de890395590092862e3
SHA1b816e7dbc831912d170c6d86f4954bb85d55b328
SHA256cb29d47b938739f3810e6a5931242ecc20e0a65c4d21acba06640c95ba777952
SHA51267bc70e8a71ae466f45155fd7b7f78b679dbacaff70c42bd8b56b88205afce4cc09e12aa15ae95853c741ca1948eefc4706dff118206f46228c60e1c82d0b170
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD58d95323f28c743c01a83596fc9186b12
SHA1fc82c498923215635d0e6607eceb6985103c9128
SHA25655acc6753c6daddc27095d236fb284c4e3c967d587a4575e7eaf152d63975ceb
SHA5121a9bf7dc10b2d963bfdf3d9776d4b51c41e90d966c7aa9f3fc82c8b149c11ee4ac6fe4ff0f45b69da112a5d64c1287a1cf1910dfac1b77036bb1e4da002a85b0
-
Filesize
1KB
MD5d074996744779144e07097ed14c690a6
SHA1d6bcb51fccd3f6528f5fac0c948a2649074ec7e6
SHA256c6cbf510059f5084f4bccc1fe5e0fe6b39c3854d90f2956a4ceb3b851db78ac1
SHA512bba8fa2e80fcd7b2394765cac10d6f08d8ec9f8d9cd91dbc9cd86f1be4f7106f8e2b0287f3ed495d9ab4f8a0417b1b589b51bdb6c6f39446908c1110597bda23
-
Filesize
1KB
MD57c8caff4e13e10c76a5ae013985e024f
SHA1b291a00fc90021290993d1e46c9fe8a37a3b0723
SHA256479be671620e8178bf648fac4e044e439edee204dc46163d77fd6ca86249679b
SHA5126eb3bd1cc4ebb1075ed53a3c9e3f7a5385ee6abe384d6d50415840c97c87a29ec383b42e9b724c2f9d408d1c26849f2736a999bb2d81680dfea6d5498fd194bc
-
Filesize
6KB
MD50952c8d77ca14e2fd60cdfe04d6b721c
SHA1ae1ba2e8ff7e86d2312e2b97991b6a7362d4f460
SHA256e148b693be33e543fd66ad285d66dcba661860c9a3c7d3c4b11875a715de0920
SHA51229e76e4e8c81eec53e2341e176ff6c43d06b4040f5646f07a1b97be90ef883dba540cc7f5b680c365c9b688fd9a465518d2e97e15998b65695118cd1219b0747
-
Filesize
6KB
MD59a4eb74ce8edcc377c862c33b4936423
SHA1309650daac315220ec4acdd359367887fd4347b4
SHA25617757960f03956a221816b8dad77047bac4a85e50ef1dc0c4103693f3256ac06
SHA51258a03a9fbf1c572d2fc502166edd7ef1974c1e6152ca4d82bb6ef6193ed222f3ce344ccef43f5c28bd4f48d2e8323532ec1f35afdbc594012b52e9e680fe72c0
-
Filesize
6KB
MD5a374b11d3980f87a6ad1ea12306d5dce
SHA1f72596f44efde4fca5183839c5247068dff7ee58
SHA2565e03bc772577e870bebdb59c9f239cbb3f2e14d264d488ac931925862204cd2d
SHA512617a40864c04d5f49920aec8f197198d44b637eb6b4e9ae9e90165cec45263f48973a9dfc701ea35c3ff7307fab2f225aba2f770f172c26c39b20fdacfc04f77
-
Filesize
6KB
MD5155c67b71a7ab1c1a49bd1c3637bcce7
SHA18dea2033d7ea53267dab700f67d96d286c5a31d2
SHA256362dd2d33840e71435802dac7a97be628a961c7826eaecbf8071a2271ec00d67
SHA512392022b916a7c43f33552510d813009cee7d46bd5929d4c332022f35f5f053f929a03008c51d583d6e0106d27f5acba52f9456fb2542548c894d503880dbcbe9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a9ae328320024631d3a4a1d7536013df
SHA12c744167ae108f55afc78460346014397a2d24b0
SHA256ac389cc7f1ea325b973451270e4a7036fdc28ae3ff3116e5707f38efa561b197
SHA512c12f7ec54cc312923e2bb644b42ca7fc70949161ee8c9a873a76d843a52b587576e188ee3a19071f793f3e5b6f2db10cc4a585cb038a540d8941acc8e587eae5