Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
32ee695115c35daf66b557340402a89e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
32ee695115c35daf66b557340402a89e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
32ee695115c35daf66b557340402a89e_JaffaCakes118.html
-
Size
66KB
-
MD5
32ee695115c35daf66b557340402a89e
-
SHA1
840476ae0ed8c25e463996b332d7b08feddfcffb
-
SHA256
6f6e91b9d7636980368694bd419d5999be06af9c6bbc7b51e440ffb55388fccc
-
SHA512
5b814f325c252a4811eb292d715e9442af2a735f886c08302de8a132378cc8b898c23be9cac04e38586dbc2c711b48340756f2b660d7117daa1d757e0a47dfda
-
SSDEEP
768:HT+HgOriWNcaSoBgGrTJm0bOhkwrMkcmWzDhUOOepR7XIG8PHGVNuFlKTCZ29v7:HT+IaFlmAOhkmcR8PHGTuFlKTCg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 412 msedge.exe 412 msedge.exe 2100 msedge.exe 2100 msedge.exe 5084 identity_helper.exe 5084 identity_helper.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3712 2100 msedge.exe 83 PID 2100 wrote to memory of 3712 2100 msedge.exe 83 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 4456 2100 msedge.exe 85 PID 2100 wrote to memory of 412 2100 msedge.exe 86 PID 2100 wrote to memory of 412 2100 msedge.exe 86 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87 PID 2100 wrote to memory of 2676 2100 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\32ee695115c35daf66b557340402a89e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9272c46f8,0x7ff9272c4708,0x7ff9272c47182⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,14094413917222883651,2125182230636937051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2300 /prefetch:22⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2280,14094413917222883651,2125182230636937051,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2280,14094413917222883651,2125182230636937051,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,14094413917222883651,2125182230636937051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,14094413917222883651,2125182230636937051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,14094413917222883651,2125182230636937051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,14094413917222883651,2125182230636937051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3848 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,14094413917222883651,2125182230636937051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2132 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,14094413917222883651,2125182230636937051,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1816 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2280,14094413917222883651,2125182230636937051,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2280,14094413917222883651,2125182230636937051,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,14094413917222883651,2125182230636937051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,14094413917222883651,2125182230636937051,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,14094413917222883651,2125182230636937051,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5ca8460aea6287347660c040e25578854
SHA1e0ee51204538c67bb53700858f7615f6925547a6
SHA256c8ca6c97c007441474e54783cdb05d4e04ee5144ae65e1193686563cb9a00f4b
SHA512ca01c310a5d5be3dc37c14e6c1f14b5c67e2afc82b665f3fd416d590ff620c8d6a103a3c2d23a45bf9206619264f8381ffee86d2c5ca5f183d9d058d961221e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD541e0c06b1daa8a743d54ffe7f426f3c2
SHA18bda23e03becf970b3a70d366fb4798e6b2ad1d9
SHA2562eeffb3831f73e2d1eb71c52363d4953f5ec913c88242ec6646ec3578abcfe1b
SHA512d2cf5da479407178ab4a3a45639574ef6a1854d4a6ef88b0bc58a82c6e7011a856cc2f9a53ee19d855a4ede3c9deea71bc20eb0f746232c5a778ae2f7ff48538
-
Filesize
2KB
MD5c72b6befbe41a8cbd5bdeaca336b28c4
SHA1ff502a4888b624e6d21da031aed46dee0bf0008c
SHA2561417acd8f43bfcfed9b24a917dc156c36ff4acfbc0dc3b4789f55ae21711b92f
SHA512f1b3b2bfc18f13946fd265c285fcf02085ea86edbb118a67438e94ae04aec532008b8bd69dc19442cf7cfc200c92f39baba223a3079bde20053c1056a157c2b8
-
Filesize
6KB
MD577281b564b75cd4b5d698d456f7bc095
SHA1d8233e946d11f4a3fc9f7208537cfeaa0d6f4893
SHA256e096d2d054909fdd08c91239566e190aa9a56d941ea5982b594a91517f838b1a
SHA512b7969b08e0752540fd96a5799e90cfe073a948b05347d3e6a997d82f0fcfc4eb9a684b59ea195deb93d7cf421dc62134058ba86c1effca261556476b59197cfe
-
Filesize
7KB
MD5064e32a0b5b1bf6f582682104172be3f
SHA1da00ed8a93896d95f8e82ee398b41af98cb79747
SHA256ef8c083e002114fbb0753ae1024d5dc20a4243e9e214802d11c2b8050db0d2c4
SHA5122a5e52eddbf3cd101fe28954ab3e97bf0ecefc728a0d93ab38b1ef7440b03188b8826c92fe10c6941977a872bd5efd5fec90454a3ea6e13d57cb7ed9a3409745
-
Filesize
7KB
MD5c1cf990ce632aba84b0181df29ae6664
SHA1f1d583b78b0526d04a5290cef52ec615c91c5639
SHA256f1652052c2ca420a87c9e1a45b5b318566c968fff88b73707424ca981200272e
SHA5125e119ff4f008286c74b56b18770ab30e923e2a0191ff5f383b56cb1269c51be53acdc795d267fba7dd6ec6a64e698e4f35c87912a6e1565e4041226d6a9f56ec
-
Filesize
7KB
MD5f7c142dcb128e6d35fe603f5fa55ee3e
SHA1a0a62ab7a39564279e6e8b2f466c64f7bd89a32a
SHA256495bc322bcfe357c966a7bd54611ae1357c514888a2463c694cae5313814c9e4
SHA51206741498c93c4f81c9df28172d32a35a706ae40d937f54caa13bc6c6eed08cd71f48ed6421111a3a3ca5fd2306d3f07c4ee2d7d675de988fe6f003bed8e9c583
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD515a0dea0e0786b5acf57d85b1f20abbd
SHA10edff8b0f5046f190a055c7b203d7b919ac7f310
SHA2564de1301ee4bbe2c60ffa98d6d4956909133a47355764d5211267198988050e1e
SHA512a9189534be66c7535612ffbd7e4335b606111a554002cf4d8d0d2b4867db21e5e134a3d3272cd39863676912b0fd72012b112aaf4c79a382d706edeb8082173a