Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 17:20
Static task
static1
Behavioral task
behavioral1
Sample
940564fbba1b67b15e17a5edfb96b2fa_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
940564fbba1b67b15e17a5edfb96b2fa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
940564fbba1b67b15e17a5edfb96b2fa_JaffaCakes118.html
-
Size
299KB
-
MD5
940564fbba1b67b15e17a5edfb96b2fa
-
SHA1
8fca1f608dcc96e465e8f7bba6aed740ccc5edb9
-
SHA256
fcf611bde688606e2b62a5336ff3520a85cf9d2457e20d065081415fd3337fe0
-
SHA512
6c80de62644dc5e9ae1bbbaee6592db11e14652ea10553fc3ba654cb56cc34ca18c0f003664ae1d60f089b75ab3ba64b3ef60aaa5586699f5df60fdad919bd08
-
SSDEEP
1536:+D+SbTTF1SjTILNkltM/jVII3IbIre0/F5mr6oql0JLnvqGmYZk03M9dE6e+BuI5:c+SbTTF7LItCVI28kkctiTCH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 4992 msedge.exe 4992 msedge.exe 4284 identity_helper.exe 4284 identity_helper.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4992 wrote to memory of 5024 4992 msedge.exe 84 PID 4992 wrote to memory of 5024 4992 msedge.exe 84 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 1872 4992 msedge.exe 85 PID 4992 wrote to memory of 3372 4992 msedge.exe 86 PID 4992 wrote to memory of 3372 4992 msedge.exe 86 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87 PID 4992 wrote to memory of 3504 4992 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\940564fbba1b67b15e17a5edfb96b2fa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc81d46f8,0x7fffc81d4708,0x7fffc81d47182⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17023947188589597317,5936146197543155766,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,17023947188589597317,5936146197543155766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,17023947188589597317,5936146197543155766,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17023947188589597317,5936146197543155766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17023947188589597317,5936146197543155766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17023947188589597317,5936146197543155766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17023947188589597317,5936146197543155766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,17023947188589597317,5936146197543155766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,17023947188589597317,5936146197543155766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17023947188589597317,5936146197543155766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17023947188589597317,5936146197543155766,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17023947188589597317,5936146197543155766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17023947188589597317,5936146197543155766,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17023947188589597317,5936146197543155766,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5f3273e98223fff06a9ddf81279a2a83d
SHA18f8e5177c105832543a3c21074f945491fc83903
SHA25603e05e6ddc2aebffc134fd78fa4cb86110322aed3adcc5619efcf7355745a599
SHA51296fa8b73a3877d1fd0b8f9e093d4f19a176367d10d8ed957cc2bc6a9d5a44cdd792ea42e44d65ae320ab1f1eb76d88f5b9f6de63658d4d7de4e4240621df60e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD557079f1f7611eed4b255ce57c968f8f7
SHA16a496b79c84996cdd8a0e9eb7c540d91d2821543
SHA256d1bd8558238a41d407d3b71d97f22d739709ff843171d49b51db8c035c0f7ab0
SHA512130419630667d78243cbf14b6e97c2335219caf9f8805fb0831bcf051876e209d8e89572b5eaac6acf170388d17e7d4ece0cfb9f431d21fb4e368e4bb179aec9
-
Filesize
1KB
MD57f2ca9584e76ac6b6a6aa2793a6cb10c
SHA1d21079ab006dcebe66984956b538daac4de20d7d
SHA2560c3e4e44f70f4555e2cb0d8407da276626ff7491bb9c009c86760f5574cd6856
SHA5125e2bb84d3e045cfd27ce0383f5f97ba1fd9d10d3bdf3823a08919044463dcfeb28d8acb535b3c63e6521a589dc857192afc20f07faa05b92448bede4db78da55
-
Filesize
6KB
MD5623d434fba92c5aee0f9518e7de3a888
SHA1599b4688b5b879afa07930c26f0418656303b3c3
SHA2562555095f6e08676c19fe4a517a11420014f3db63f6a0b9552fd8d0258d805ad1
SHA5123e29c3697329e757f1f4df3a8eca826be71e8dbb0bffdd1afd8366bd55cde962df1323feea5ec5b89125c147a22e6958e236127447fb91c5dae9b0043604b205
-
Filesize
7KB
MD5a9841d0e7f1e67ee34aec55a8eb8ede0
SHA1aa7b445a8f4c2cb606d36187e0bbe32e3445bfbf
SHA256a2b55c417739e638f8d1d287ac49b6b9dc69d0a1b4383e5ebdcc70b574601e41
SHA512d39f68385686904e172a773bfe3e9ba5d2ba09f646875084c807a784104570a223b41149a1bde772e5179f6b812e33b895d2ed17410dedd38227ffb54db720a7
-
Filesize
7KB
MD5d7ceb6d616931e77d135727dd1e37fbf
SHA1fed40c77a7a5a072a51e5d2ee93ec702793c378b
SHA256cbd20e48fe9690bd2b965690d8bbcc077af93f6aac7cdac8c8eeca74eac56a6f
SHA512fb67b54dcf891f197680147a3576154c3834a225e09f46a0dfc19d5489e7ca855da2e013b6ef299709e3b2963423ac020ca49819b6877f289317c49a2f1c97d2
-
Filesize
6KB
MD5868ff4607ff7d6d5b4aa0d72581bf8c1
SHA1497913b6d5633f7e40af9161878eeafa0ae5ef77
SHA25684460c602fa964a31ca058faa27e6c82bfc9e774252aa104eba2c45fa14f0642
SHA51262349997e634d18f3401e855f0bf105981998ea95535f8c39efdfd12acc1b5b8ae890e621f58cfe03ad68db86e920987797f1a1a3b0f298f7037a0eaa9ec6aac
-
Filesize
700B
MD582ab1ead628df524ce4ec03c360fb0bd
SHA118ff5d9fda54009d593fb4d5c51f076cbdc4a240
SHA256cb54eb4838b2ba503632db1df00650c775c07b20b8e4a5f53c0a1d557f4b8578
SHA512024f0f12dae2824b69a9aaf2e4a99aae69cdf101ed42ef5eff7e2f6d1ff064a79b2cb8cbbdaf72452bf26639f50b0feb874c4c7c0c230df431d2ad2c51c88c4a
-
Filesize
203B
MD5917f8b7d410acf48707f94436881437d
SHA18ec2c53f31372284092147868029edaa4092b0c8
SHA2566d0d17b8ebd84a4f2b97655aaab2260c521f3011de7fea335edc389dad4bbd0f
SHA5120a4b8638c048bc77a97ade9613271efcafbe272a19bdf8e82d7ed2723c837e1e3510f2e340dfd9792a72881fe5e0093284c0cfa8501fe80083580fe2956513dd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD520162ffcbe0701c200d5523586886aca
SHA18da63095b8ecd3185372c244c0555b0e289f52d3
SHA256d7bb5f18b7396b7426d054021595fed6c89ed64f47c3cc8a333c518c87233640
SHA512b9cc18a6715877989a3e9243311ee5ae128bc5613403ee9338bef5ac3d89c922aaf921af30289fc485db05e7d39b45fe2aecfe4cd28b41fc99c781608801f6bf