Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 11:24
Static task
static1
Behavioral task
behavioral1
Sample
302ccb9f4432b15066edc8692d0a56c9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
302ccb9f4432b15066edc8692d0a56c9_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
302ccb9f4432b15066edc8692d0a56c9_JaffaCakes118.html
-
Size
97KB
-
MD5
302ccb9f4432b15066edc8692d0a56c9
-
SHA1
0c5be1905e440edfa90d2cf4c816bf0511e36e32
-
SHA256
7a2dbbf57482786aaf9b70b055c1b8e6a780635f2fd73a9188dcb55ae334cc06
-
SHA512
884e84011ab2d396f07e09fdf02bb95845952106948a9c30ded8dd2733d21b103cc4e84c77f48c1bb02524717758391380b86ca8d838f7c44e66a1007185209e
-
SSDEEP
3072:yau26QppfEoIis+pvgQCzDuke8rL+kR4wdK:yRQzfEdiLV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2416 msedge.exe 2416 msedge.exe 1332 msedge.exe 1332 msedge.exe 4784 identity_helper.exe 4784 identity_helper.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1332 wrote to memory of 2004 1332 msedge.exe 82 PID 1332 wrote to memory of 2004 1332 msedge.exe 82 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 4768 1332 msedge.exe 83 PID 1332 wrote to memory of 2416 1332 msedge.exe 84 PID 1332 wrote to memory of 2416 1332 msedge.exe 84 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85 PID 1332 wrote to memory of 4672 1332 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\302ccb9f4432b15066edc8692d0a56c9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb54f46f8,0x7ffdb54f4708,0x7ffdb54f47182⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,16268807260182794972,13342509883370623908,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5210676dde5c0bd984dc057e2333e1075
SHA12d2f8c14ee48a2580f852db7ac605f81b5b1399a
SHA2562a89d71b4ddd34734b16d91ebd8ea68b760f321baccdd4963f91b8d3507a3fb5
SHA512aeb81804cac5b17a5d1e55327f62df7645e9bbbfa8cad1401e7382628341a939b7aedc749b2412c06174a9e3fcdd5248d6df9b5d3f56c53232d17e59277ab017
-
Filesize
152B
MD5f4e6521c03f1bc16d91d99c059cc5424
SHA1043665051c486192a6eefe6d0632cf34ae8e89ad
SHA2567759c346539367b2f80e78abca170f09731caa169e3462f11eda84c3f1ca63d1
SHA5120bb4f628da6d715910161439685052409be54435e192cb4105191472bb14a33724592df24686d1655e9ba9572bd3dff8f46e211c0310e16bfe2ac949c49fbc5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD59645756168cfbfae76e873b6f2daf5ec
SHA15ea63a5c0b421f6a1e85e8f5560de9882e07a530
SHA25676b0c9dbea4449a7c20f8cd744db42326db4efce3da84c62d75b9872b0cc01d1
SHA5129acb812bf3c54d4634d1612b847717b20cf98466fabd48a3f0af22bbafc1e544791665dbc5bd0cdaca6a31a77d4b44e2469915393ba69c59d5ecd19705f17ed7
-
Filesize
1KB
MD5c2916983416df6cbfdfdb1b4d82c504f
SHA1578b2bcb5cfa2a2d4f9d0f8fa08e0b0b3dd6fb37
SHA2565372e30eb8b955443d34a60929aceaaafb8b0ee22daf1d8910388fd6ec0bb9fd
SHA51275927c5fc782df2971589f23d54d96a3b869fc3b5e1f61363870810ad8f4009a0284e480d9892ae84e9382fa5c66e14999de9a2aeb357f7e89714c34a1447841
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD54b8a2353bb570c0e9a5c3acfefff5e76
SHA1c884ab32b07f07d15d02376c4f6e16c0136e4f7f
SHA2569a42a53563ac5d281f58b72f83defa0b42781e7dbace50039c06128cf1f9d53b
SHA512ffebbe5218d776bda1f60ef57eddcd4170ad2991ad670117b16f3d92dd29fa35f2daf13de0fb1acf7c87d4f2fefb1a71457c28569da27d7104ca8c55c6bfc34f
-
Filesize
6KB
MD5279d652c6dad486e6436c35d46d11c1d
SHA1136a0490f40997ef1e2b06ab8515f69fcd678483
SHA2566e43e8d46022008798b4c5c8e351eb0e78879b33e5a1c31bb57579e8352578a3
SHA512918fce6a50ca8e9c3c38f64a7d26653ffcdd735c31806c2edfb9a7222f584891f80fc03403d330cab277f3d45488af75444a8bc1bd36b7b06f102839f22a1472
-
Filesize
6KB
MD5aea0ed459667a818fbb7d78faf189d02
SHA10b5a7bad31b1abd0a778153746f0d24c672a531f
SHA2562c42edbe0e874d9bd2516f97b6d4702d2cc5f5117f409e6568b8be0c8635ee51
SHA5123ce2d5d41a0538e992b6a91f9963673dbf71b834452c2bbb0c69662ab4ca712bb60bb0c5521c901be58c1582429a22e37b7e38dd900df89676204c671afb64ba
-
Filesize
705B
MD5a31d0df84b1d21139e0a299c78f041d9
SHA1cbf576f83ec82e890022de0348e9241376a173a3
SHA2562aef9687d49fbef2d53af7f37dcec600ab467f26d4a3bc84d8026f8b3f4b7e5b
SHA512f6d1245822828cbb480fcc411e1fd422d6ddbc877c595abc2072e264c037fea1b631ce0b92bf4aac63163cbc5a8d3fea82b5462a2730a5dcfe6f2a01c481783e
-
Filesize
537B
MD545402a5d97722293c77c36441991bfde
SHA1c945c282a0c9c538235b1b297653e0d8b266dee0
SHA2564a868b07bc5ea5f528ea7ad7c2abdccf59ba567ec7cd40b53bc3c8d23c26519a
SHA51295c535fbd20ec76dd2e90e13d4b67038609c88433db9f07aa629cf6a037d0ef8ea87d1728dbde3e4d4dd07fd5a646efa23e8584e189b799fa985f30a23afc681
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59d9f11387bb306248a8a4d1cca52a208
SHA13f3b9471d52d8be49bf39e10d28646defed10719
SHA2560c69776c02e284b424f921dbeb822dfcaed1182c77ff8f4dcf279cc1e362cc21
SHA512176afb007e756195887ddb4b63a0d5dc8259e39725c0130ec616af79f4ea3fb639ca53fd03920b1b96be44eb86f0b0214512a033c9bec9ded9c51687404edd2f