Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
b7855a09475b49b38d31e0ed53dd1a6f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b7855a09475b49b38d31e0ed53dd1a6f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b7855a09475b49b38d31e0ed53dd1a6f_JaffaCakes118.html
-
Size
57KB
-
MD5
b7855a09475b49b38d31e0ed53dd1a6f
-
SHA1
554c3cbc50ba257430bdc75d85967d4719e0c253
-
SHA256
d7bf3472232134662fcf76bc3e4cdefc03d6f7c8d2a756ac4b9bb93d2ffa0354
-
SHA512
8bf8c847446a7d04b265edd2c72ff1cc42559b2ee4cced0439a05fbfbc2bf2e62d5136ce02da318a2acd1362a140f176098cf4ae4ea7fa0d5917be2414f8f761
-
SSDEEP
1536:gQZBCCOdF0IxC0y5CbNwPoE3xtbTEOypEE44J5Nckd2FxPDtjvbnVulEJ1M/EjPi:gk2P0IxiCbNwPoE3xtbTEOypEE44J5Nx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2264 msedge.exe 2264 msedge.exe 1216 identity_helper.exe 1216 identity_helper.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2264 wrote to memory of 3044 2264 msedge.exe 84 PID 2264 wrote to memory of 3044 2264 msedge.exe 84 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2076 2264 msedge.exe 85 PID 2264 wrote to memory of 2368 2264 msedge.exe 86 PID 2264 wrote to memory of 2368 2264 msedge.exe 86 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87 PID 2264 wrote to memory of 872 2264 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b7855a09475b49b38d31e0ed53dd1a6f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ffe15eb46f8,0x7ffe15eb4708,0x7ffe15eb47182⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:82⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5436 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6549878894729296175,1562761240150988672,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:5048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
212KB
MD52257803a7e34c3abd90ec6d41fd76a5a
SHA1f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD57670fd586646d8d832e08abe16fe1efc
SHA1d9b883d5f16b98c601563acb165d3c6cb706ed83
SHA2563afa15f97926d25533df3c5fb5e73d4744f9aa619d960f1fb88fc592e1fed077
SHA5125f26884c3b1f814db24df9c85cd8e6afd82efd61b7f78bbbd3a111dfb153fc8b9fd7c7053b09a0926af00b6befe20beaab03fbca13f05d331639f763fd3fc0ec
-
Filesize
1KB
MD5f9185d82e70668f0d26e2ac353e29e98
SHA1e2c127384db6b980685c24e3116cd1b2bbdfa096
SHA2567871cd6541643fff7047bdd890431aed9752dd82182059cf934bc2c6818f5536
SHA51297144039d2303cc5bb54238831df22ae29b9bd35db68ea7151e7e8840e55d7bec6b46f559fe8248f12d70cf4d372479f841ee4fb3a343ddf961679a6c87d5a35
-
Filesize
5KB
MD5b9ead62a21f1917b2bf46066f613cada
SHA171b2c8e0a1602d265e64a5aea32bf859a67a264e
SHA256e7768d4bdf79374f6bffcd5d3af5eed4a0acac110892e6eafbbc738f59ed5de2
SHA512cea82c85394bd89d36959f8561c09d7ef00ddbe82f8394cf19a2b3bb8dfea9b1beb8cbb8ea1492f907e93194a6506dcfbc810c94494bf204c71486cf4f8fd684
-
Filesize
6KB
MD54a9aba8e9e89c68938f20d0e601f48e7
SHA1fb9dbeae83deddfca4220e83f968607fbd32d8e2
SHA256a0da7690c5addf4a31d61f375fd3ce5a3520d53bc8bc54ae5c1694e91ab76278
SHA51249e371c3dd1bc88ce8922b8d2133d835c2cb5120424c19134b46df68200b6d2915a425fb7fe142bd70f32dc20eb7e02c4899b4e6e9a0138d1c9e2c42b6702673
-
Filesize
6KB
MD5ff02d4e57a4112c7e7e1ec401c8ba8d2
SHA13aee8627b1d11538ccdc99ae364c298d369f8b46
SHA2565caf43756ce70df57b3824820f469d668f85f774266092ded372d0aa329bc12b
SHA51205acb4bff9a19e8cf4868112cdcb6f301b5254653a0e1a765c975fc7ad152f507766329d559b9c93e37f6783afa3774e732390afcded55613753d2c45193b502
-
Filesize
704B
MD5eb12875f952fc51c705cf199bac99a80
SHA1ba73dffa6c650c9acc4d68e68c20132768f16276
SHA2569276203731c8e855204690b1712ec4597d29bf5ebcca041a1cbfa02f37821fed
SHA51222a99c5de342bf347de2c3226815c45e0c31c6d175cb62b93034b922e62e83b905430b7137214212b4abb4f084a10d55e6e5f8b976fa062f2ba3d01efd8bc763
-
Filesize
370B
MD5e28f5ea66ab731d15b298bd1712d5bdf
SHA11eb88cd23bd50ada2624636e5482343a0a5629e5
SHA25694a948763c5369a5aeca8d99cc0ac4680f5faea7300d948d8941488998e12350
SHA51279c3d52e5f5afcb355979aca4ea8072141fad1668378bc66974cac80f87ec1794d3d38b43e6abaf98d05b224948e62108b6458c813b80f53e56ade0acbb4c1b9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5b50b7e3a5db7546e4d33c2bded859478
SHA17b8afe543bf0b10bf515ff826b3b813f947c4565
SHA256a5c19862570ef3bd031cff1f7a8e3f4eec9e0893703f75ac1f0fdee048c52b4d
SHA512bbe12d4d612dd97bdff3b93dfc81f6d95fdf83475d11363f91dd13eb49269b7a7e216607e912aec44fb895fb9f20ace24834a7d456cbf64d30ede2df9baebad2