Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
9a82c7da83996ddbdd4444c6c1c2cd25_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a82c7da83996ddbdd4444c6c1c2cd25_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9a82c7da83996ddbdd4444c6c1c2cd25_JaffaCakes118.html
-
Size
168KB
-
MD5
9a82c7da83996ddbdd4444c6c1c2cd25
-
SHA1
35b682fc5db2a88d199b936da93732742e15f310
-
SHA256
0cdd52c57e0c50abfad7afea6ce69ff11a25251fa8833bb330062875916306ef
-
SHA512
6582180ae1806dea9165ee6a4a4f513627eb89697cf535370c608fd0dac9ce053c8fe9f298db54d37b46f9f98909069651ea12eea709c9137a3e11684df83c6f
-
SSDEEP
3072:IkpjunCPrmojdMuq3IV5It1unlh/khwg+0V/QYBSUOJCKtNB/6Aky8htJ+sNbo+Q:IkpjrjdMuq3ugO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2732 msedge.exe 2732 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 1996 identity_helper.exe 1996 identity_helper.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4596 wrote to memory of 1008 4596 msedge.exe 80 PID 4596 wrote to memory of 1008 4596 msedge.exe 80 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 4744 4596 msedge.exe 81 PID 4596 wrote to memory of 2732 4596 msedge.exe 82 PID 4596 wrote to memory of 2732 4596 msedge.exe 82 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83 PID 4596 wrote to memory of 3540 4596 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9a82c7da83996ddbdd4444c6c1c2cd25_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8b8946f8,0x7ffc8b894708,0x7ffc8b8947182⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,10813330767289996226,11983910635248572548,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,10813330767289996226,11983910635248572548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,10813330767289996226,11983910635248572548,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2480 /prefetch:82⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10813330767289996226,11983910635248572548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10813330767289996226,11983910635248572548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10813330767289996226,11983910635248572548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2988 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10813330767289996226,11983910635248572548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,10813330767289996226,11983910635248572548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3252 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,10813330767289996226,11983910635248572548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10813330767289996226,11983910635248572548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10813330767289996226,11983910635248572548,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10813330767289996226,11983910635248572548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10813330767289996226,11983910635248572548,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,10813330767289996226,11983910635248572548,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5453351f13c8ff97cd3334dd5cb90230b
SHA1790dd8cb3258ed179c227540c909412d4f2db7bd
SHA2569de95f144e2aa08ad34772c3e67be378035dbf8e04e63d41b385294564449501
SHA512746f7266bedf1e3ca00440870fb03216443b48e3b020f62127cb1894f07963e5ba5a91a9cdc12203781832eeda66fe49d08c9508c7b7bb62c02d030bd22cc084
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD5169fa5610e7b2e2a18ed25517e49fe05
SHA1ffec6dccb87ce3909056fad2c4f30423d0fc349d
SHA25663cf809f5aba0dec0fd57c6e0de563fbd0572164479ec8a01034f1a9c81998c8
SHA5124568b824352450aee735779a24222970b73dec3c58412619f7804b8c9a17ad15bffacaef0f0597de4d6d04b6c249feefca45e6f1deac357be9a80b3bcd3e4f24
-
Filesize
3KB
MD5f11cb11cefb3031359025d38ff9683a9
SHA1ba7a19f085f2df578a6a0c92e0e700565078c6cb
SHA2562d469e523b797cb69498610117421f085efe41571206e46db7b296b9bf08c817
SHA5128ed74a5e4a186d93d7c6e3f7d0b7c748cd8864920bffbdb312fc54b93eca269efe8e9813eca73eb95eaeaf88bfd14ae1f034caf885eca9caeb066fc866561cc7
-
Filesize
5KB
MD5c6a0bdffe0b46a034d36148d16aa2d76
SHA12d38d26434a0ddf622bb74436708f0eb84f1a80d
SHA2563f8a9b9e73ab1df5bb7245b684cc3f8e19a953eac12f7cb9fd671d9afc98e9fe
SHA5127d7356951001ad0eedce0d8b84bd6ae3d1b2ae41ac3073b977bc9d2e3444f485979a6dc701b656083350f7e0560acafabcf1091bfcf934708dd68213a9d60a4c
-
Filesize
6KB
MD57f2644e24d0e635f87d0c82530f43e56
SHA1fe0c805dea17b643da5f6f830e2fefc2c05eac64
SHA2565ebce7261e7990387acf411c16f17b48a8cc58d7729c7ad12984c51a68f622b7
SHA512cb8bf2754b7087440fed9cb1f5514683a89289bbf8f0554a57f358cda3170589c1a5ba5e5764391310c433411c78382c591b6e6ad254ea35f4f624fbfc255a32
-
Filesize
1KB
MD51f29d3330a068df2b475695a01908f97
SHA1e022d489d0927d220bf7aa4fcf3000bad826fe64
SHA256757348139bb199fe85242100d347aec7d0f16f96a5d2cc0c7276a78ee8b7f431
SHA5129a448e9f363d2ef55e10cc571a83763edd1bb11a757de16fa78f668e8fb54e923a7443fce6fbfb533b524d4585314a8211185fe028742a128201e3ca075228ea
-
Filesize
1KB
MD57bf71be5f01f9a8be44b0e4a8c088fc4
SHA17db80af50c064504b02c020d274f7ee64c2eb2ac
SHA2569b487ffbe89cce4b6f4add5bea0c178a51ee74853810644f995e4b7b1038202d
SHA512a59c1ac7555d4c287d6c3779fadd150083ef85e97a680b4ceddac7613ca84bc39ffcd09c9a35af8a30cc28ed35284f41cf4d5969e2601706914823358b6b2322
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5df9d6ac0e4108cc414172b3a8d358552
SHA163bf89bccffa1302ea13b046c6ba03ccb0bd0ecb
SHA2560804209516eebab83c2c08e2ff2a33ffaea9accf54662d5c348cf8614f270cb8
SHA512a4ea1c090148282722b0b7af149cbb9b41e3c6ee90821593976e89820d8323dbc268ccf207ad36d8d7d98cd90d816528c53f69f27867a4acc8956f8df027e19b