Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
6d4f9f74decbb798ba10bd141adac218_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6d4f9f74decbb798ba10bd141adac218_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6d4f9f74decbb798ba10bd141adac218_JaffaCakes118.html
-
Size
102KB
-
MD5
6d4f9f74decbb798ba10bd141adac218
-
SHA1
30116fe2809072971082643b99e1b7f431b702db
-
SHA256
e98c7021c67005772803773ff7866fa83f7b26826a0cdb05b42d30c3ac6ba7b7
-
SHA512
87e93793d0ed42d0db4ac57d15970ddee8e9690dd4a85b21a28c0aaf41aae5292997e254d0aa6fb95763deb82510ac12bf8f7955f72d87a6cd68e799f40cdede
-
SSDEEP
1536:jEVvG4F6iBY+ck7ZJDLTmBN1zXPcviWbQnu/0kppjdrAGcxitod3p:jg6boYZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3344 msedge.exe 3344 msedge.exe 1984 msedge.exe 1984 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 4312 identity_helper.exe 4312 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 3584 1984 msedge.exe 82 PID 1984 wrote to memory of 3584 1984 msedge.exe 82 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 2236 1984 msedge.exe 83 PID 1984 wrote to memory of 3344 1984 msedge.exe 84 PID 1984 wrote to memory of 3344 1984 msedge.exe 84 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85 PID 1984 wrote to memory of 3208 1984 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6d4f9f74decbb798ba10bd141adac218_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff942d846f8,0x7ff942d84708,0x7ff942d847182⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6840 /prefetch:82⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6508 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6500 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7472145449235891236,6508536359896651036,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD535f55bf1c1edf0dfcbb1ab0da2fbbf73
SHA1245b78c18ac45d28945ee4658bcbc6a4c043374b
SHA256daeb311f8dfddc8614aabf44dfb6bda2be744eef32ddc710a6518f1c938d1e88
SHA5124fead5053547aaa63af5077bd81d2f8adb93626d6b9440942242e892260e92f3d81015af5e8948bbd951beadc6d9f9c34934cadd8fbb430fe8daae31fc8e4314
-
Filesize
1KB
MD55f896b358ef4f26ae7c62746b5c11696
SHA134fa4cbf36819eaea88fe16a38c0e676c31bee13
SHA25625b44359ede93dc4243abe7ae92747c558819b6a7120f30576deb3d9f23a70cc
SHA5125abbb1e740fa4e84b9cc18f7ea558d2009e4b94644de5f95b8fac49003aa174557bd91c1c3a854c50e04bb8b94524fda8f7e59bbad53d2df18bf8eb19b1c3720
-
Filesize
6KB
MD564756b81b73da394dc509c38ac2ef766
SHA1a04ffb6097155a000272bc169240ee532f8cb7e0
SHA2567b0210b9591ae284c403e6e709fcc9892eca855dbc6a3925d4d7b2a79cbc0683
SHA5125ec2ebc39dd8e3bb5b44b33a7c0593ceccabea8f3dba5d6d534aec589962e0c9a24c6d564896a4b396ffc6fd8155c3d8452643a4546176954ed3f1bff0a70796
-
Filesize
5KB
MD5c8c451720615ae8fcb7bc1009efbab23
SHA1c688f06a4475e524b0dbf9f365bb428a894e3c4f
SHA2569b90cb707c3d343a2eae26c6e91343c59c0dc80e86cbc03dfa9403453e419b1a
SHA5128a35aed5833bea9882104a9427348cbb667db5f96cff66133ee0ca0c9c85c3fea0741ea8c749f0dcd733b90c0e3bf45f8aaaaaeb4f0b69bf49c2b2089808d9cd
-
Filesize
7KB
MD51f1e0234354686b1a47d7d5d9f01f279
SHA11308b8f2ee7c03004151c429560cb4f88e84289e
SHA25663463a95b4a14e7b3b364be34b8364f0afb11cea308a1796c9468ab7a095cc4e
SHA5120a951d6e03589f0033117130c5d8a3b2b7ebf35b94aecdaf2eb0b0043da17ad9377aecc65c859fbe37793e7bdeada20912bec7419b11f0b1fcad211a2d4a9b01
-
Filesize
1KB
MD54c0ed65ea395ab389540655713e3202b
SHA1b380df5174976d4e95bb85a70828af5a9cf3da10
SHA2560645cbb491497fa4428c9676c470158ed7c2d791f51b4247854fac45fb5a7a50
SHA5120fa79d4110c4dc7b0ab59af92c05ce836880a46f00e9531e4c55700ec5501500ac697b7c21f9e78f210c0b8e02431b2086d4a6bab6cb43482ad2d3a831f2276a
-
Filesize
1KB
MD58b99764cb760dd2db0cd9de1e78cbb99
SHA1c84d0e89977257872b49664f17035f36e419ffa4
SHA256494419101ffcb94b8fc439aebc9b7e6b29815a991f04aa0c312e0c1f2ac93b43
SHA5123e8e861235fd838f10e8ef7c47385b5c150ce978aad6bf517a12c32d226cb60dbc044b9062f7c6e2adea589ebb8d17332726163686a58bd5d5eb256e8e3153f7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53b07664495869926a1f43415731868df
SHA1f2438918d0bbab26db8da4bdba3d6fdfec319d9a
SHA2560729534e9401ef25e06c04b5b6a14f82a594d70a18ede195bb3519280e63a068
SHA5128b20a5d7c18ba099243d31c0c72c94e0c9aed10c11c24068e9585eae1e7f5e85dfcac6b5ae7caca889cee7e3a362bc2134d9dbf64ef83d7aeccc467cdb102cca