Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
9537cc8ae98fb5f17cf633f958cd9455_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9537cc8ae98fb5f17cf633f958cd9455_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9537cc8ae98fb5f17cf633f958cd9455_JaffaCakes118.html
-
Size
123KB
-
MD5
9537cc8ae98fb5f17cf633f958cd9455
-
SHA1
1d2ac899d913e08f599f66ea482c3dcdb1815ba9
-
SHA256
9aa57d2a0a46b8843defcaeb9256a72d0523c6bc5968a78e6bd2706d08ad3e09
-
SHA512
d0498200ac556308f23166f44ae50a5110073d7deaaa0e5807d3055b64a4a14c97219844bf05db2d5d41ba2d3d82bf48178fb82438e63fbd16837c766c72a49a
-
SSDEEP
3072:Qvnliot2jdpCI21OR+vJoH0G0DHGLGOodoLtdbtqe:QvnlepCZ1O0i
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3392 msedge.exe 3392 msedge.exe 3584 msedge.exe 3584 msedge.exe 2376 identity_helper.exe 2376 identity_helper.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3584 wrote to memory of 3784 3584 msedge.exe 81 PID 3584 wrote to memory of 3784 3584 msedge.exe 81 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3056 3584 msedge.exe 82 PID 3584 wrote to memory of 3392 3584 msedge.exe 83 PID 3584 wrote to memory of 3392 3584 msedge.exe 83 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84 PID 3584 wrote to memory of 3620 3584 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9537cc8ae98fb5f17cf633f958cd9455_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc76fa46f8,0x7ffc76fa4708,0x7ffc76fa47182⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2212 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4228 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,13734987014772789040,18300987206654946438,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
44KB
MD523536ccfe05b737ae639fe63ee4cc435
SHA16d2e9822835dc3e6117a4d2addfc8f241fbdbc82
SHA2566ae9edfc411ede03661a3d910fafddab3d6b313d1f4668dc8c5a84c5ab23a3ce
SHA512f416e36b2322bbebd211fd1ea69c88883f00c7b00f14474a5fcce4a408840c0d1b0304eb8941509a38157d0583485f638959eb7d5b9ae668aa88c1d3eee8dd0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD56180ca263e6287c05d18ca2b56bf0e13
SHA1739e5cd9d0c23e15d96d35deb3bbe1edffe691b3
SHA2566bb46b7250236f335576a3a04afe2635160b97b72175c28daf2469ca2580f79b
SHA5120b16e755602cf67aafdc97ebde1bd2d79a8031ada85130c0ac5232b151ee62cb6857d70f1344d1b2c3df9312d214f77e7e6274da787fcc3764792d35806ca77f
-
Filesize
2KB
MD55ffdf44a910d70074dafd07e61d4d253
SHA130dd5ebfe35e35583196e37d474421239bccd8bb
SHA256fef43f34b4557f853505a9059fad988782ba79f4eb2e5697295e78f609b23e65
SHA5127865491e938a9dccb6a3f9f8033fbc000c7547d4cefc4a19ffaed2ae3c46e1ca71ae2927c048c781c94d30ee1088dc59bd404034c2f753e81ba5eaa143a9f2fa
-
Filesize
5KB
MD5d32a82b6d81aa73e4de5da853da4408b
SHA1eea346dafa9d841bbe5a4ee803ee79767e15425f
SHA256185718fd53745bb698de39504a9dbeb64ffb1ef5507e9d1cd7f0a9057846401c
SHA512078b85d093ac327213289c96f146a469d0de9aba813a5a0c4f472c4dd94a5c7fa82ae9e03d7732ad9901294b620354d90ee67acd603fa05f19e6446eb84ce673
-
Filesize
7KB
MD5191cf46b37f96b719a386fa732185bf1
SHA1f42bff83bbd2b455330507b387404b59ad0bb885
SHA256ae547671ea30a6ba827ae0d952d63ab5ced520f1699afb563fc6f38b9e85e7bc
SHA51295a8758c76246a30cfdd5cf3b94bd3c3fd9654828070d07b729e7720fc82086a0a171ccfea36088222d71ecfc2fbb7076c296866a4323a1cbd18da5793550181
-
Filesize
7KB
MD5bd5a01dc6ed3b26a1fcb0e1e50eb9ff7
SHA1e8f037e8827125589346b850b8b1385dbb232e9a
SHA256c41563d2ce511132266446913794c2f51f19c0e5f428e811b36dd49faa958415
SHA512127d9373ea90a9012b7fb3f78b8df9abc7f3a06777617a7eafb6cf2a73d228dc4e61968cde8a8ebb6c1e3f2e7552836ff1de8a377eb186de5ba1d602cf7ca3fe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD513363d7755e379b80dcefce7d024fb04
SHA168ed47b4cd59db28a621b71ed171afc1f5ca7ac3
SHA2565b84bbec87ece3f44ed82907d072d2b0355f65fbe40b22bdf14ccd9f3d5e3abd
SHA512c3558edc2cb501e7ab695b92aee1915362011877a8c1b61f56bb8a62bf4508b47507d22b7b73671831ea14e7e291b4c4c007012f5cb57c77e0fe0945d35a1c5d