Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
ad559b13f5fe040a85a31a26a2d2cc20_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad559b13f5fe040a85a31a26a2d2cc20_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ad559b13f5fe040a85a31a26a2d2cc20_JaffaCakes118.html
-
Size
57KB
-
MD5
ad559b13f5fe040a85a31a26a2d2cc20
-
SHA1
2a0fe223695da4575ca7468933fc1b6e45b1016c
-
SHA256
91ace768e5715ce97ff1745c5edb5b02e88638e40f2c4dbb63579ebe777ed7ab
-
SHA512
eb198faa264d5e19031debf713c93dcc46d13fd96bfe9129ca515dd5429c82e3e337eb9d7097f97fb04b971363f6b32049c13608de17471d0dd53616b51d08f9
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVrorGwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVrorGwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4892 msedge.exe 4892 msedge.exe 2576 msedge.exe 2576 msedge.exe 3528 identity_helper.exe 3528 identity_helper.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2576 wrote to memory of 4160 2576 msedge.exe 84 PID 2576 wrote to memory of 4160 2576 msedge.exe 84 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 880 2576 msedge.exe 85 PID 2576 wrote to memory of 4892 2576 msedge.exe 86 PID 2576 wrote to memory of 4892 2576 msedge.exe 86 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87 PID 2576 wrote to memory of 928 2576 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ad559b13f5fe040a85a31a26a2d2cc20_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff92ff946f8,0x7ff92ff94708,0x7ff92ff947182⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3696 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1364 /prefetch:12⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,848687279079547016,1762997975623974731,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD597b128eb4b31b1ff2dea14875cbbe513
SHA19bb41043f525631d7e2cd343c4b08c8b28cdf8e3
SHA256c3b6a9d5dfd1938873c82e7d44a0d972e49d05405329d53f222eb825d6484c95
SHA512cb86304560c2b104b8d24400375de2c9e300a99353c198148b9adbbeb0759c48849a4086ed025c6d9caa6bf985601ab2be740d06739ae4cafddf8e7a9bcf590a
-
Filesize
1KB
MD51bc1cb04ccdc50848c669e75cac9e5f5
SHA11a5ff013d7c2c81e1fcc47678a3bdb2d6bb9098d
SHA256070b2887dd5bc507c73c302ab74ef82ccda3799f8ab75eb137c5ba20e71d5887
SHA5120ae810bfcef0f73650cdadef8f1ca06739b449cfa3629c63397be57a132fee04200b2ec50451bdbcfd0a038b7c5788f5b827edaa6a602d084acb01e815e3c6aa
-
Filesize
1KB
MD50eed2fe769e2ddb0eb99ddb6bac3c5e0
SHA1887bc226a7a629a3029f2e28a1b60ad9a383bf80
SHA256c403191f76865d04b6a70fb2888ce2cc89e89ea6d8e73bee26a6b4963fdc5c6b
SHA512c27344ff06930e06cbbf9315692f203f816aaba0a51886b96ed30c9837545cf2f02b5165970bc2889ba2d2b8784410b329793ddaa117a4e256a5245c98cce2ec
-
Filesize
5KB
MD5cb5bf1b9f1aa92a1b0dc7a660365b213
SHA1b7293ebf684b2cce5a76220c6f8c2163660c5e4f
SHA25625271c28bead1f8c5579edaaf9a4f1554805b7424d0b98528223cd2ef178906b
SHA5129b3fdc8a03f767defdff29d7ecde8f853de16431b6970d874c2716841a1fa48a8d4c2d58a4c3e1650e599e631bc56a6c05201b4bec1552a4ab4da7746834b693
-
Filesize
6KB
MD5b1f6b30abb3d225805f298b832b5c4be
SHA1b6787ad97e4b9f6fba6fd7b9ca20af4b9a0de8ca
SHA25692ea5fbd7f9abde74664fb856a9e61cad2694859307a5b4deb175ca683f1bb84
SHA512470f2efb4f6d318604bb7b215fca6a8a117db7c477e154a727fd665bc236b2916283d798a7fd580dedfae085a9af7d62270d11069e1fc7602d23294995c927a2
-
Filesize
6KB
MD548c77ea4d5ff0c43abce12907ace566b
SHA1b3681a344388a7d13e97355e2afa8a5335a12a00
SHA256f10f70e1fa144313acf7547d59073680d51f8695c5d9b705d3c99b67f65284d4
SHA51262c44683d4fd2adf988d27473a704737850906ad1ff76aa200598271da6898b54cfb641222c20288d3cd05ac4d7a13e0ef6309280b6dba2d3199632932018390
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53e79abedcf4d3681b58b44661fe4363c
SHA1b4128b589ac8050ee6794c3f1589f260123bc48d
SHA256f695b29d409ac8cd36f7f00c2f29a73313a506158f34da488ac1ef076cf0cab1
SHA5120321699e1db69dc39ca3a966486f0edb9127efbc21779929485f8c6f3b088afbf7803a049de9eddd3ecdc653f79ea023358a66da123d7f394676f6e8b7fb9136