Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 16:49
Static task
static1
Behavioral task
behavioral1
Sample
47196180612aaf398a34b227829152aa_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
47196180612aaf398a34b227829152aa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
47196180612aaf398a34b227829152aa_JaffaCakes118.html
-
Size
175KB
-
MD5
47196180612aaf398a34b227829152aa
-
SHA1
69534658276bd288975465ea50641db5251b0f67
-
SHA256
e80a4bd2dacf6ff9a04908218525e57dec089a91296b7838e59580536a4fe8d1
-
SHA512
f749385c5d3b89c5718edb3aa76fbd38ece430261367770b86322895ffaf5944b78ab351917ca57e29628c9fb92911578722c0084f7c16af4fc62482ae38f0c4
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS33GNkFcYfBCJisk+aeTH+WK/Lf1/hmnVSV:S4oT33/F5BCJi2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3752 msedge.exe 3752 msedge.exe 1524 msedge.exe 1524 msedge.exe 4456 identity_helper.exe 4456 identity_helper.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1524 wrote to memory of 1920 1524 msedge.exe 85 PID 1524 wrote to memory of 1920 1524 msedge.exe 85 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 2420 1524 msedge.exe 86 PID 1524 wrote to memory of 3752 1524 msedge.exe 87 PID 1524 wrote to memory of 3752 1524 msedge.exe 87 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88 PID 1524 wrote to memory of 2396 1524 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\47196180612aaf398a34b227829152aa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6d1046f8,0x7ffd6d104708,0x7ffd6d1047182⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:82⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,4617520878980097176,1165270445287279579,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2544 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8863d1b6-33fe-4ace-887f-65cf8e65a11f.tmp
Filesize2KB
MD59640c7bd1df3a0bc9b9de2e661d6ca25
SHA103518e3ba2f08c4e0647918db3eb70ef97df4ffc
SHA25643531881f3dbdbc1df54b8c726bc477bf45b5ff2a03e15965716be3a15355755
SHA5127c88f90906a0ca2e8d9cc14a78abd559726521d838f843178c42c01c7daba4715eb204104514fc9f0f55b5f80f6a97bf781dae50876d2c478665f9fbbd408d6f
-
Filesize
19KB
MD580b654ce97922793f0ba65eef9460504
SHA14d9c8ee0f4046505655513161e006e9b1564f178
SHA2561fffece56e8c86c14a99d17897e0fd2173d673b954dd3727e2f26de542ac3289
SHA512a7417350d58d0984b266d850216b50c6c8a22bf77249112a9e1fc15e9d0c5e8f0b72aa9659c59a9620aed4568fbfbf9ec0db7d7f7ea8aa29d59880520c684dd0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5a147ddfd1da0184fb8db83ec868be951
SHA10cb5f632ee16893f723ba6855f734896bec0b82e
SHA25611c55f1a7a4c6e89255d3a29e0c2870c18084ecc1021fbed62c1ee06b707301b
SHA512d8e5698455389dd1c4dc948d0dbd77887da7627f67233ca88a3cfade3296715baafe8a31e4efdf45c23af5d30590fbb76dd3236b0ba7b650cbef43f4cf67b0e7
-
Filesize
2KB
MD5eeb25bab1ff6ad7f25187bcf6ac8e220
SHA1b249ade93821e1e8ab083e0797e3b1e36770041d
SHA256a77b902a8e178ae154b92a26925a49511981941b964f3bd1e48fba1b877e0fc3
SHA512fff0e94693eb487cd9d0df672c8a7d9b9c0fdb23ce73489ac1ea1c66ca038e0e5e46c0a9b8e45f14d5c6dcffe6dfc05f0192d7adbfc24680b34f5c9952b2d475
-
Filesize
6KB
MD5e14cd9fdf3fba608f94fa10c9951cddc
SHA14761a0671681288453790543f32d12d766dafb0d
SHA2567f9ca5b966cd1fce9e45a328104c61a47ae1e90a707e7fe67374d5399343d4b0
SHA512725b3d6fe45e8d3c54e79c80feb779881d55483b82c2255b4d39ef3eb40a17092ccc56a6df8c27b97ac623ee4763eef08f792ad8cf3298ec7bc78af8d5abbe62
-
Filesize
7KB
MD56c4c0d28adc9947eaac3476e9c118a18
SHA13a49dc982abb2d450ac86721d3037d5c2f4e4d92
SHA256cd6573b6de551cf6457cb9d673ee1a0a9ad01827cfed1f50d6950df568a7dd85
SHA5123c20bf7f146d0852bd6075a02164c2a0500c32f3a866ad8c3ee469c45907c4d28b8cc4a135bed779d03e2a3d25cd30c300c12c03747cfc33577522e9d5ec5454
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5402a59c5c1ccfb7d2e872411f7be22ec
SHA116e5c39e2992f7f6d1648abfecb4518c36e0442c
SHA25655f02fd9e4a75596eb9905cb93112c37ad1546a96856bcbb5bd0bf8f74a3d844
SHA51213ab0543e00073779e891fb55bd4bd2b0929dc8b08dc5439690e436a9ee77d25125dcec3e8aaa4501463773643c60de13bf5d1bff076e7f8ce6e92414c52ef49