Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 07:25
Static task
static1
Behavioral task
behavioral1
Sample
d5e6ba03a005553dbb54d9aa891a90fc_JaffaCakes118.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d5e6ba03a005553dbb54d9aa891a90fc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
d5e6ba03a005553dbb54d9aa891a90fc_JaffaCakes118.html
-
Size
124KB
-
MD5
d5e6ba03a005553dbb54d9aa891a90fc
-
SHA1
c18f5338de34c5c1ab3a285b939af81cdced098e
-
SHA256
9ddf4c6c1e95e1b41bfdfe1c2d3df89541c9c8758dd73e8acd01750803cdddbe
-
SHA512
4e4df9088e44525e98abb608011b1a11be0108d6c7d4320e0dd9078c187171aab718f48d2f62d4bacf96c0868e18e077ef817802ee7f994565da05b858b3eccb
-
SSDEEP
3072:pUACWDxYxQ2PDxYxC2T/Z1sAoEZNueSefhENE/jzCqezqo3DO:pUA1DxYxQ2PDxYxC2T/ZVJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2128 msedge.exe 2128 msedge.exe 1644 msedge.exe 1644 msedge.exe 3724 identity_helper.exe 3724 identity_helper.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 4620 1644 msedge.exe 82 PID 1644 wrote to memory of 4620 1644 msedge.exe 82 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2416 1644 msedge.exe 83 PID 1644 wrote to memory of 2128 1644 msedge.exe 84 PID 1644 wrote to memory of 2128 1644 msedge.exe 84 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85 PID 1644 wrote to memory of 712 1644 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\d5e6ba03a005553dbb54d9aa891a90fc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdac1d46f8,0x7ffdac1d4708,0x7ffdac1d47182⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:82⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,11248477647487269238,8532587364536537588,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5cb0a8b44a3ceeeb57dee42281e7e098a
SHA1302e5e7c672e9db338dd3dc5945d05a187ab8dda
SHA256115d9399c3c7d620cc316c010dced2cc69b1877c23e64c87830084ebb911807d
SHA512cfd9983a84376179b5fc04bf7ad53b6fd7bca12c4a77b445c0f1384f24655d65bdfb948fb9c86fe4dfd3fd29478c67b0895b4b22af2ff8f04c37c986ff3292f1
-
Filesize
1KB
MD59401f4aee5558c837c52f790c6604f64
SHA1946cd8d6f53dbcdd219f13be495bab84cedaa4e0
SHA25675ac8c502028c25c205fe7a01e67d5e96db63857f173fb42723727ab35416a3e
SHA51256e371f89acde417dcd95dc2f1ea4c11defd5384ae22fa7e0852044e407c85e04d3ce7e17eca4266608183baf7ae144e7b141550e77cd32456b10ce646a4e17a
-
Filesize
1KB
MD5a13bade984fcaded2a60f69a1a84667d
SHA1b7bf940dce6ad0e489b0958fd4274d762deed96b
SHA2564889c191c7c3a6bd7689e0e7279af9c0eb2a95ea31ff5d9aa60900c888259b23
SHA512ea5b0cf7e9c73353ef9fd793751e6984a70622c9aae13fcb7a9ea14194cac89677028eb5211b46350f34063191056a0d643e6859ec3e6ea78b6ffb4edc281a29
-
Filesize
7KB
MD595cfb98f0a1faba5826d6ba905c1bd7d
SHA120963dccf3b9db212b41766124b8c64f1b3ef1b7
SHA256b33c239bd5e36d7d311d8a7e802cd6678d9277f20accbdb0d49c5d260203272b
SHA512dc242441a64b24653c3d574ebbb8d500cc79767a70d4458b00701035f620103410a3dff5c26bae4bdb587cf6cdce8b9e84a3e6cfca4da899641850d5e72a9b78
-
Filesize
5KB
MD57631e858241c6bd3b4d16a8574176b4d
SHA10e66e91a598a8c29613d134a0142345723e8350e
SHA256ff72c21ddfd8315e1e61493fe1eebbca4783c61f3182b7fd4dac298ee3782856
SHA5120be134055d5778a7bc33889a5f8fc19b208626892070a5bc2dee22401a48ecfc884428615bc94b545e2bc2b63b6398ad71c6a9acc380e5fe01f99d205c8e0673
-
Filesize
203B
MD58c76212ad3f804505dd7988288362197
SHA10921b9bcbb9e9f250bb35e9289d0fcc743226e13
SHA2569488fee5d4007e931d7eaed510ec6183e35a0dec879e19a0b5f50e5133b8fc78
SHA5128eed054005b77178108fd6ada7273f36ec49e4bfda7687e58cc1a1035ebe0ace4e1a0aafdde69e8c58ee81724ca0924ae437e3ac756e23c74d1f2c9a17bde815
-
Filesize
203B
MD5d27731eb4f2fef7ad9cb4223547cdce6
SHA19fb358caa356da491db575e18cc1a5c6eb3aa7da
SHA25648dcbc6cca62e6cb03e9b7a39d89f56ebef34ab3460b0dd493e47aec17c21c2d
SHA512bb447ef20c6d05f047142882f35ed1a52222d0481d5a47356a64288413833e3bc535bc61cf80cc606904592b77db592890939ebea34f07d0eaed0ee54054b4fa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD587b4066b76b7f25b54aa2959f7fcd6eb
SHA1ff9c53776bbd4ff807cca1e72025eff24390bbf5
SHA256a0fb9259b1efb0392ff6851fa166473dd82ca3a7846807052af1858e7a6bedac
SHA512f6028fbe5b55af94621baa392ff84b0be8d554b15c8a6639d48df74ac3b40715dc8913bddaf08aa3919dc03eadf4ed7711a950ec2062c7bc7bf94c7d3e8d01f2