Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
dc6417bbf10c63ded39cc412437baf09_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc6417bbf10c63ded39cc412437baf09_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc6417bbf10c63ded39cc412437baf09_JaffaCakes118.html
-
Size
70KB
-
MD5
dc6417bbf10c63ded39cc412437baf09
-
SHA1
b2fafa9b807e5164d03f1bc3876781452897606a
-
SHA256
3f1d2a053bda9d7828b01ebc15f5a2d5f6844f83c1fa800ebdcdba1a121ea352
-
SHA512
b0a64f80d50a3f4847393e571677485e728372e6faf0d8e690b1c83f231b3a842f3bc5d2bc246b02e3592e23c7f98f5fe7c5602006785742548d4cabeb5833ec
-
SSDEEP
1536:cablmYga37vnIUpBk1II/C3CYsZ2svA+8XvfnP4x/CRY/tKJzak:cablOCvzpBSzyIZ2fX3P4x/CRY/tKX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3264 msedge.exe 3264 msedge.exe 3872 msedge.exe 3872 msedge.exe 4916 identity_helper.exe 4916 identity_helper.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3872 wrote to memory of 2188 3872 msedge.exe 85 PID 3872 wrote to memory of 2188 3872 msedge.exe 85 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 4180 3872 msedge.exe 86 PID 3872 wrote to memory of 3264 3872 msedge.exe 87 PID 3872 wrote to memory of 3264 3872 msedge.exe 87 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88 PID 3872 wrote to memory of 2452 3872 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dc6417bbf10c63ded39cc412437baf09_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffe26cb46f8,0x7ffe26cb4708,0x7ffe26cb47182⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6652 /prefetch:82⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7024 /prefetch:12⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1840,9949803903444508090,5714931034864545199,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4684 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5e5503c9278331be78585795094612b52
SHA1a1db02d0a3fff05b03d8116161bfa708d6afa3a7
SHA2564888657c55cad05921f5941a8270fcb1cc5d8ae4aa393942d5b46278d1515a88
SHA512926ffc70e92dcfa1c157f5a150b9d3991ac17e268b5155789ff77c4bd3c3801a77ca7ee9f2fa08b1bc6adf3ed268a66e6107e45578dc2c1f9682ab8483aee64b
-
Filesize
3KB
MD5af4aa110bcb746eb454dedd8a697e199
SHA1afd911c9e2087c69af6364fb98f905c6f1dabd74
SHA25602b4df2f0b92185f991d5487cdced43d08e03c489eaf0f311589ee5928f4903e
SHA5129e3dc8c22148432f2c25f75e0451b44cdd5b539b820b7bac5dcdd797d944f81c5d191eb39f47d315af70232842b9f0c0a7a96ddbc4cb508ab8324beaf0416a3b
-
Filesize
5KB
MD5f50c297e9d946d556254825e968ee6b6
SHA1a048144dbc99eea7a974ae934dfd90435c45a932
SHA256188cf8b3da8c76739724de4167915c308d878c09feb11124c33f6dc9098df1f7
SHA51244e689c3d46c8664295efb0defdc1f555bcea52b1de9fc741a1ac94c757c6c8723922f9e8fa6c480f9c87b402d3b8b1008c1f46e20163b0f9ce88a2fbace4308
-
Filesize
7KB
MD532a5b6958fc7b517d51eb624b2879c28
SHA1ac77504f88ee3f42d64d4195c84d005c28475306
SHA256908488e6b57ba3ba741aabc7247428860b4aa88bdb2eb1f90e923e48148a74d4
SHA51230c4d0176d677cdcdef764261124780c119bc97d9930548d75c8042197944b3a70ada76cdb553c085d26f1c6ea87ea42d5532ffcd6f76c62c6db661e37241c51
-
Filesize
7KB
MD504a82052a6b2f082f538636cd206d739
SHA138bcc123bba2c4e87d7e6deaef5b2c6771e82b73
SHA25651b15aae1025c8dc07548b04f915bb1f6295dc2a54cd77a7bb75ec4c82714acb
SHA512c17e3abcd457620d75d403b47937047c21f0fbacd4442a0d130fb93c2d6838d47be2a40856f26399947b3136a5a769d829750d4ca2614a5ee03233affba3cf7b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c505753264c062c9f0cdd7b61c066ed6
SHA1f75a6a368832964e179500096b87de7d5c78a27d
SHA25681d2cd115ba3bca7c8070e509f69ef61ebc0f96c487c13a3c15e8ac41918b2bc
SHA5127c2cf03286bfdf7478532fb99e49c7171ddc55bb7e16a8c221a7eee8906037b6633dc84bffd974d292945881e7864c726c9f2d1fa2c4367a0354d485bfad8221