Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 04:51
Static task
static1
Behavioral task
behavioral1
Sample
dbd7cba7d7ee92397c98e0d04f16aa82_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbd7cba7d7ee92397c98e0d04f16aa82_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbd7cba7d7ee92397c98e0d04f16aa82_JaffaCakes118.html
-
Size
42KB
-
MD5
dbd7cba7d7ee92397c98e0d04f16aa82
-
SHA1
4f50090aa65132c89bd8caf1df7f161d641116ca
-
SHA256
33611b0e030f15f2bc0199f1dd48e4a77943b49ed75370b6b3cbe18a7dd7b0da
-
SHA512
fa9e3bbf3470d4333bb7433b2fc6dc6d7a655e67ecef6e72a96eb2babf68647be5b988af568953ca344b4416a9ea5df0d9e9a08ed9464cf1ede0583e7c948781
-
SSDEEP
768:TX8JPtvK1DqhBUpje05zQeAMbJMZ73XkwrlNHgWBWWaRTERMRtb9TRFboFi/Etpv:T11aCpje0Ocdaga7adEOnBTTMFi/Etpv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 2984 msedge.exe 2984 msedge.exe 4792 identity_helper.exe 4792 identity_helper.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2984 wrote to memory of 4304 2984 msedge.exe 83 PID 2984 wrote to memory of 4304 2984 msedge.exe 83 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 3204 2984 msedge.exe 84 PID 2984 wrote to memory of 1476 2984 msedge.exe 85 PID 2984 wrote to memory of 1476 2984 msedge.exe 85 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86 PID 2984 wrote to memory of 3260 2984 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dbd7cba7d7ee92397c98e0d04f16aa82_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8964d46f8,0x7ff8964d4708,0x7ff8964d47182⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,6337955934037374416,3918808553186250293,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,6337955934037374416,3918808553186250293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,6337955934037374416,3918808553186250293,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6337955934037374416,3918808553186250293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6337955934037374416,3918808553186250293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6337955934037374416,3918808553186250293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6337955934037374416,3918808553186250293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,6337955934037374416,3918808553186250293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6152 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,6337955934037374416,3918808553186250293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6337955934037374416,3918808553186250293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6337955934037374416,3918808553186250293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6337955934037374416,3918808553186250293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6337955934037374416,3918808553186250293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,6337955934037374416,3918808553186250293,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2608 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5827906524b334d0767588adba11be66f
SHA175df4cd8f3677e2ed27a9596ddf0711bbd079bdc
SHA256978e87308d8786c4b4f4ec9660cd7123cb50f9c381b9f15d2ad76a1235e49b03
SHA512624c4e6e934661d043f5cbcf39737e0f3a3fb0b07a26d29a6518d5b0becdd21a209f271326c3f94258191bffe7cb3152f2c530936b7ae2994d7a325d6f0c18b8
-
Filesize
1KB
MD5f945305fe37a776d79047d2688b1e642
SHA14f6a1fbca0fa04053d97cbce8efde08feedbc934
SHA256f0ade0beabd8749a3d8bacb45a3565d514d2606dd6f60a831c6ffe74a422b95c
SHA512a1639149a7db6f91543cc519a146b8716d61209f73c89ea044dfd573acd403a42bdf4570cd0029fe1fca63e5782e5472e3a54a9021857609deead4fef39a4e92
-
Filesize
5KB
MD536931307c27c83fe383b1e90c8d7fdea
SHA1775ad48f87007802c5dd515eba1d88d55c48ef66
SHA256caf7e60d49ddf0f87da1152ec02832ba7810fd4b704d3fba585160a0b88f8fcc
SHA5125f2a32b63aee335eef2f517c899fd959c73158a7c7ac054fa2022d20b2e79f4ac4f10146b004a300943f9fbf8766f5c55352be6db4b37635b0f9e0d8936c5178
-
Filesize
6KB
MD5039edfb13dc72a4f62dc0cf744a0bc24
SHA1edb8863a95279a20a2e6d54a51b2d35576455da2
SHA2562b3ab9804c4cb113042c8a626ba4c2bde1771b9772482ee9428bc418c806c4b4
SHA512824da8cf5dc458416ff5e110a33c6dc3bcf01c7a701aa2666f72f230130e6bfb44d04c45e570c71ef22a5e334c82e58c3a99a3362c54316bf674a97f30dfc4b2
-
Filesize
6KB
MD55d10d258ff2909715774595baff1ef39
SHA15500338ff2afc4fd0a034b1876f62cbba372d098
SHA256ef0662a86739710f286c42d8d447767f3c2c349ce516e2bcfcf9de7ebce14625
SHA512fe1013aa179f2141020995d411dca5a046a5e03acd746b80bc7833048802050f223e8a662a1e4d013331a384937d1352f0b2e39e036701143ef402ce298507ce
-
Filesize
538B
MD5d8032a24d061873fddb67720c79e2277
SHA176c8c51da4cce484eed5ba31dd6fd5a129d74be6
SHA256f792597f12846ea45914b63c406f22c0fc2be857060d66b2223a4ca57877f939
SHA512980cd155bd0e86ca6abe693ad28508a055eb25c6d09f34a51a95dfbf05b1831153a7c3029052bed81cae73c1c2382af67f5b3ecfc3905b70072d5760cb279fac
-
Filesize
538B
MD5e1d83e8ef06aa2f00debccf052f965e9
SHA1271b985adc552cf5a1dd149f4be474bcba79e9e4
SHA2568865d80b8082b9fcb3ed7d4db3c03073dc84f19cc0be81236499b8ade1d9e444
SHA5121ce82ebf6aa89bacaed77d7b982294df370ac90a5aa9068b2d29ba413c3c602400d5568936651d1808db8e8df72da1c3585fa54f7e1f9e7ae2eb7e9858e46012
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57c01de8b09bdbba78010cd4746463deb
SHA12daa6433883be4acb9eaf1596a3822c75f2c29dc
SHA2566cd29af433bcfcef13bd82bf237691664dc3ba219ddd75c1c2377b27bbceca86
SHA512aa84d5e4848dba922bb43f7984fabe8c3924109b16be3e14ae503a10a8becc53958271b92ae07bcbaa7104101ae8b60fc1bcb8c184b29cc25c06267c6f7e0a45