Analysis
-
max time kernel
145s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 00:53
Static task
static1
Behavioral task
behavioral1
Sample
ad46b6a72448732c74d6ef0059d99a64_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ad46b6a72448732c74d6ef0059d99a64_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ad46b6a72448732c74d6ef0059d99a64_JaffaCakes118.html
-
Size
16KB
-
MD5
ad46b6a72448732c74d6ef0059d99a64
-
SHA1
c96bac4cfa9f09317b2c6b8f7faffa1faa53089f
-
SHA256
5174b013847b5f1f1ca78efb584eef844bc6e5d356d5b4229febc6a2e9e0be35
-
SHA512
261c289e40b70693d169893539232cb03de696871421ca662489368bf0e382fa634d45e189c933ab6567c19344df8cdcef0acfc2205749110071f347eb59ba07
-
SSDEEP
384:Bp3cSoTn5qGdGBs5h7lMevEez8PbOta27lS1SciJ2:7cS+2O5hOmrQb0h7sbH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 644 msedge.exe 644 msedge.exe 1772 msedge.exe 1772 msedge.exe 116 identity_helper.exe 116 identity_helper.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1772 wrote to memory of 4284 1772 msedge.exe 84 PID 1772 wrote to memory of 4284 1772 msedge.exe 84 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 2240 1772 msedge.exe 85 PID 1772 wrote to memory of 644 1772 msedge.exe 86 PID 1772 wrote to memory of 644 1772 msedge.exe 86 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87 PID 1772 wrote to memory of 1076 1772 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ad46b6a72448732c74d6ef0059d99a64_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91f3746f8,0x7ff91f374708,0x7ff91f3747182⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6344 /prefetch:82⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2080 /prefetch:12⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,6109855799084672638,7279752651180589469,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD55f5b4c0f450c140f24984489882b07e3
SHA1ca93ca928ff6f3c6b15b787fd465a2b6aad22ba9
SHA2566c040d93e21f21938ede86825f8a25b669cafa608c885c5ce0f95f6b5211ef4c
SHA512adeba31629ec59347ac5d92388a431b300c5553711eeab23cf1ba0d248d7c40e74ff123d626eca31114b1a53bea56cd1b5a0efe022811d14e2d9dc61b46e8a8b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1KB
MD5e53fb45db7f5c625b83dbadff0f89a63
SHA19264078ceb6a1f3d4693cbba3e67aaf76d9b1b9e
SHA2569c006979a2c21c78673be3377c75423b18be3ca631f45a832a9b4cd41ad443da
SHA512301782c97a880740186568d0ee0693d6d3377a054a5f46021956aab8b44b45201f7047c95d1dfedc2a2265bc52ea641e697154528f711e4b48c2af9bf5a05cb3
-
Filesize
5KB
MD5fcc4b37e034756a6784bc5abb3a9c3d1
SHA13582ddc051e8e8cb3944caaeea71faad9ed70ac4
SHA25629e44f37c2b8428d0279360c3c679a4fdf34131c5ed45397bd6a73dffdd284e5
SHA5120f25edee843d6a53f0bfa78205cf4c2d02de75be48fcb32cdfc81634c3a6b2abaecf68abdf9f3465ffef7708fe92df863fbfdd11c5e7a2a6f2179f5b73da4713
-
Filesize
6KB
MD54ecd0f0dfb7001cffd5b23ba910ad47a
SHA161a361e57eba80bc5f6931bc238677ad0a9b5aaa
SHA25684b7c93a08b8490002aa91864b5779e0255391ac17c44e4525de985e903470de
SHA512a9547424fbeeb1107e36b8cad6275e1b61799ea394293d955146c69122d621bc658e1539ffb1473571dacaf32d9e50b82dead07c40341d45eb76bbc5ee36d4d6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ce50397a640e7dbbcabdde6b34ce20cb
SHA1243d20a890df6d2f7407977bd92fdb2396071851
SHA25612c8158c58c05098ba3f275e322b465ec6a862f24f1be7792c1c27048f4fad8a
SHA5124fc796a592b9447506ae7c90d3f0de81e76c919763990927034916b66a5bad9c3663cea7622ee7dfcb6625124599de86d85523dbe59ff73ec8019f68a6cb75f9