Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
f9d7c2872820adbb4053a959243fa7dd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f9d7c2872820adbb4053a959243fa7dd_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f9d7c2872820adbb4053a959243fa7dd_JaffaCakes118.html
-
Size
432B
-
MD5
f9d7c2872820adbb4053a959243fa7dd
-
SHA1
3fa4b694023e0f96e4c2cb01bfe1ae87a39cd1dc
-
SHA256
764cd78467c4ad0c002a2fce23831b5c03769166e6c9289a74da4a670f878748
-
SHA512
4c3a0bf0b8ddabc2775b2a823c3d721b3ac338a3da6aae8eab0f81be08249f5e773a8a38732348380a989b12b13070e10e7b112a8e2b558e4c031c1844e3c067
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4988 msedge.exe 4988 msedge.exe 4716 msedge.exe 4716 msedge.exe 2344 identity_helper.exe 2344 identity_helper.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 2260 4716 msedge.exe 84 PID 4716 wrote to memory of 2260 4716 msedge.exe 84 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 808 4716 msedge.exe 85 PID 4716 wrote to memory of 4988 4716 msedge.exe 86 PID 4716 wrote to memory of 4988 4716 msedge.exe 86 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87 PID 4716 wrote to memory of 1016 4716 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f9d7c2872820adbb4053a959243fa7dd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff979df46f8,0x7ff979df4708,0x7ff979df47182⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,8624580739210736858,5443972039579378307,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3568 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD55cf470190f3b51acd8db2b6b2bd90285
SHA16a73ce37555971b8b6459233d42fddc906976a9b
SHA2560abdbb67a360b29fd8002d1ec6f406423076b460f7c6af955a1ba47174d71829
SHA5127f61c073aab1c1fa1400601925a90f03caaf5d1f3808b43f12db795e2c0ace3b75c59a2f58f8b9406c9b3f3596ab3c38d0ea9957fab2db5e8c95b5bab4f29539
-
Filesize
152B
MD5e2ece0fcb9f6256efba522462a9a9288
SHA1ccc599f64d30e15833b45c7e52924d4bd2f54acb
SHA2560eff6f3011208a312a1010db0620bb6680fe49d4fa3344930302e950b74ad005
SHA512ead68dd972cfb1eccc194572279ae3e4ac989546bfb9e8d511c6bc178fc12aaebd20b49860d2b70ac1f5d4236b0df1b484a979b926edbe23f281b8139ff1a9ac
-
Filesize
152B
MD5864aa9768ef47143c455b31fd314d660
SHA109d879e0e77698f28b435ed0e7d8e166e28fafa2
SHA2563118d55d1f04ecdd849971d8c49896b5c874bdbea63e5288547b9812c0640e10
SHA51275dce411fce8166c8905ed8da910adb1dd08ab1c9d7cd5431ef905531f2f0374caf73dedd5d238b457ece61273f6c81e632d23eb8409efbb6bf0d01442008488
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
7KB
MD5273ba0a3f6de837b440229c96d5cb7c0
SHA13570b7d5f55a9f6dd92c602615e53a84fefe3cfd
SHA256b111b63e48c4693f9e51ab0fd13bfef3d69e5bec7554ac8fc6bd3d214b3d9c54
SHA5123108bbdab8ac74cc1ac69ad1ec5235603d2d0ec8fed5158dc1ea7ab86f15814a8d867e67370c71df1ab19c6eb7737bdb38b8ceb6578ab952385cefc9f13285d4
-
Filesize
6KB
MD5630a9daff083f63f8b2d3136f801597c
SHA14bd948c667ec8c2681fb691735f1884b880e22dc
SHA256fec714afefa011613ba49801eaca42a1f72513e19405a242a9ad8d2afa6d7399
SHA512a2615c58c859d2b0fbb59a30c45f0566bdcfd09228e7102963f28c4e47703753eaa73934725dcfd8dcf281914083a8a17517c4412311b48a11468126c5f7ae43
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD525fa6a769d1b0fbf92ede5e2fd7933d3
SHA171d72b6dcadf5bc1a0de750dd139ea253a0651d9
SHA2566b69bafcd22119df5f2927905d933f449ef68953ad42f473fddeaf673b2c9a7a
SHA51274fa85d3a5974f640e18137a2604a6d6ac8ac39a1792c2b52cd9e97f662bdbf2c1eace1c50dfaed4f65c76705464492ba1b696bf3d799a56bbca2b7d98f040dc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57b352.TMP
Filesize48B
MD5b66e4cff3433534ae3d84aa7100b9972
SHA164dc72c55bd9be0255b05bdbef6f484e4af9bae0
SHA2563ecf488fa85b538a5a3a157e9ad5cb692029b9f5e1b1b08b7dc6ef1e5ce7035e
SHA512ee57148dada0b504d35c92914d4ec6ca84809ce70f877a23a24617073ee0fbb6f75fa06ff955822656073681ae574abe8d0173a47390c57e32e7014d58d20f78
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58bf0ebb579d74615652fbafb76c6a0e7
SHA16a67a429911b08eb2fc3af45710131d88f143f23
SHA2560f8de8f14bb5c2e507d65944ca7ac3a5b295fac86e5428093d8c32b0c531b013
SHA5127ee8313bd3f370281756fd51028adfac9773054dc08ad9c2f30d039bd6316c2c79b8d3e30941c0b5ab603b0be406c06a31e3774d94e48494b45e2f8636147a1c