Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
70ec9aaa6c06d44d78809095c4c4111e_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
70ec9aaa6c06d44d78809095c4c4111e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
70ec9aaa6c06d44d78809095c4c4111e_JaffaCakes118.html
-
Size
48KB
-
MD5
70ec9aaa6c06d44d78809095c4c4111e
-
SHA1
ff02912a67d3060f0d47388d3b91e4ea8ceec5e1
-
SHA256
3729198558d372d912342f28b788bb2f4a8540fc57cfcc6dc3a9d6fa935a9ca3
-
SHA512
2a3181042e46c734da4f109c4006db30db39fd3f3b173bd2c3eb63ae371f423e7c0bbd22dc29fbe73397ad7390f097ec73b0b47ea63cd54ef10ccd48d911a06b
-
SSDEEP
768:0zMGRNr6+boVfSMUkFZhpWzLNB050Q1Ao6ct42SxAr:4wfSyZ/MLNeX6ctlr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 752 msedge.exe 752 msedge.exe 2964 msedge.exe 2964 msedge.exe 1120 identity_helper.exe 1120 identity_helper.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2964 wrote to memory of 980 2964 msedge.exe 82 PID 2964 wrote to memory of 980 2964 msedge.exe 82 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 1772 2964 msedge.exe 83 PID 2964 wrote to memory of 752 2964 msedge.exe 84 PID 2964 wrote to memory of 752 2964 msedge.exe 84 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85 PID 2964 wrote to memory of 2036 2964 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\70ec9aaa6c06d44d78809095c4c4111e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff61f746f8,0x7fff61f74708,0x7fff61f747182⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6692 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6812 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7164 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7052 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6620 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15264964825106850345,6306479446595933851,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5600 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD592820bd0b262553552b7ea7393ed13b1
SHA14ce98c25b47ea87110f6c2b89942da9514106f68
SHA256e9244c1890d0d10e13c7a7a31c44fedfa926ed3ad6efcf6127098dccb8317ed3
SHA51203bca6024fb02cd83c8177462707fa8c720b417e921eb89334a7c32e9d3d3448aa5e21d7b195e38a502f9b9d3e735046e0a5d6851c3fa50478a6d7e88fe5397f
-
Filesize
2KB
MD5c92a1d51498cd59b4b082c5866f64b01
SHA11da402d57d399636957e840eee9dfa941dc4dd70
SHA2561d610c199502935d960df13c1f0a2a52613230006d435bf79f64faf05f71ce90
SHA512438f5c9c02168914ff4dd6dea914d78b54ac9c056f8f036f0292974733013e85b7e79205a95a3a5a92e90abb786a8c1159b6b87d4f54b2ecd707a731ac7ed2a1
-
Filesize
6KB
MD55f5c44336ff409434c3c064a352b0b88
SHA1f84cd5827502909e86f433baab6fc7c989f07ddd
SHA2567cf6bc96ff5c30dae41cd64592351a0bac9dbffa630ca87dab11e73238b379d8
SHA5129e6c595169d861007e3eb5a8281d34bebb16e3418115cb590893ee3ae3669a889cd59e10bae12a6bb70ad5b4a59700f0ef0e55784aa5594410230986818ff9e1
-
Filesize
5KB
MD519aa18697f24aaa3dd753648f4579b71
SHA1963a249ce21ad76fde9c85a5da3ed952d847131e
SHA256281b4cf6c2167628c24fd9851c67454148d7db61353559f2814455fb971260d3
SHA512bc9d808271db42c4976010d7d095ae7439e6706ee98e9ee87129abbd790f69d6812e2bbc7e2e72920d300930e457d3400a8ada08a9050c47709e985288ab7d96
-
Filesize
532B
MD5a51d119d2a7c74caba15c071ef72f72f
SHA118c194002a5ce09e6cc01b4a5947a0f4a6bc5a8d
SHA256f68e678e5fe042255d40c1ff8550357fc1bd511f74e271bc7695f13ab67c66b6
SHA512432e8f5f23d5a3bd1e834254bbfb24f723d49034665b504bf1b583fc9c5e9615550f53dffc5dd0c6ff75f9e3d17f493d2c0a920e24dd4f6c760375fdf148717f
-
Filesize
201B
MD51a8b807ea1b53c8931bc28bd728c0811
SHA1b5dd7b0ccf8b14dfa28f3126f0c4c4185f51fd2a
SHA2564c3dc0e645eec18bc543f481af9262943cf47aaf9564e2a3d6cd01c7ced84473
SHA512bc4a96892d1f8597c5dd552557a3a750c750a37b97f18a298923298c2e02d1804fbd281687dbfbccd120e8a2ef40a00c2fb827566b03b6ec77fa711b52808559
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c9894799d93a69557949cf625a955429
SHA10b91d25de0f829dd57f8e8aa14c1ec10dc778119
SHA2566451a5554b263a4436af0473f5f50989992273a62b2e0869dde3d08e04940cab
SHA5128f5b087ad25c06d45e58f23d1b65517d9322f6113190625654e784db06a4f34b598680a536cb98b47fbc9f6e38bb664907b78e85e9226a628ad388e81a247840