Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
8c0ce671ce476ac1e57baec891067fcc_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8c0ce671ce476ac1e57baec891067fcc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8c0ce671ce476ac1e57baec891067fcc_JaffaCakes118.html
-
Size
139KB
-
MD5
8c0ce671ce476ac1e57baec891067fcc
-
SHA1
0a588497f3b1f4cb05495d0f10d25f886326736a
-
SHA256
582baaf2390b5ea7954164e8c800815c118b039f18a492967b9be15e06aa9286
-
SHA512
f90cdcd225e29b4f9656794534d77ff3369653956d2acbba1dc58871f283293056f94a99ae749164b6e94fa0fe5e52e12369c94593508876489ccb474d285a50
-
SSDEEP
1536:NNp/H5lmnlQkxGvbZrMGvbZAQFuQ7EyQ1tVAchydXvqXGRibOl7j6K:N/ZlmnlQraQYQQVAchydgOlSK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 3652 msedge.exe 3652 msedge.exe 2400 identity_helper.exe 2400 identity_helper.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3652 wrote to memory of 3316 3652 msedge.exe 82 PID 3652 wrote to memory of 3316 3652 msedge.exe 82 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 4740 3652 msedge.exe 83 PID 3652 wrote to memory of 1820 3652 msedge.exe 84 PID 3652 wrote to memory of 1820 3652 msedge.exe 84 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85 PID 3652 wrote to memory of 1784 3652 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8c0ce671ce476ac1e57baec891067fcc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa439e46f8,0x7ffa439e4708,0x7ffa439e47182⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:82⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,17220319006232787420,15623488613038983663,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\40f052b6-48cd-4d19-898f-f5aeeaaa2cee.tmp
Filesize6KB
MD5d53c997f7cef76f0fa49cc4a7d99f699
SHA1ea3f3ec49a255a416c69895d47d15c1d049b3e30
SHA256bd7fb9bb32e6cea274e977d3c4d15abba01ad0fd0cef98347d3be46041e3a2dc
SHA51200267cf804ad21eea2b1d056a6cd83b83b986ed5c4983229452c0896e09f0027128d1b51f399067f962e38253ac6ba61da40db9523fce522e4fc3c386a7d784c
-
Filesize
2KB
MD5a78c8516a9817625a7fd1132299072a6
SHA1c345bfad056110a6d7fa648f7559ba14dc651093
SHA2567eb5f97ae67d4a3897f84ec97186300b6fba3e967f862e423a801ce6db42247f
SHA512d6858990d12f181c007ef17d2eb1f7cebd479b739d6ddb06e4bb14d423138c3b335f902409f1a72b1e638ef0c118960ac4c47a374bbd78ce67e5d43b79194839
-
Filesize
2KB
MD55bdfe67f0ef23e4c6f0ac44276a7a305
SHA1cc12244b5a34c9d2bc1f1d86370ffc7b672790fc
SHA256fc8eae54f2b44ae14d0987252e7cf169e14a28d028b87b5940f134733cc6d0a9
SHA512ac133ba6775bb04a4578d62e683f0c5eeca29b4a0d52fa40b86c6d3f56ee0559c673c473530c541b8ac9913286cbe53ccac4d021f7683a2083b4948ccc977a9a
-
Filesize
5KB
MD531a364b7c8f1b7c15cad275b1340e25a
SHA1fed8728b8a997e083da2b20b8dd0b4454e1bc153
SHA256cd572728aeb99ceb7301db4b32c4dba37369473ccb7d6fadf5df31a9a4470924
SHA512fc177c05277b305ba7341b2f4397416d0a0f179cb1204c56dcac82fa02ba2cb34a516763ae04d71f0f95aaa57e5c6158e97aee352cfc975e22017d9a62fa4246
-
Filesize
6KB
MD579b28fd96ed39bffa0df55b2dcc2fc19
SHA18f920711e26a4cc858abbaf9ec683615c15caea5
SHA256b476186466ab21d9744ea8e180ee0d77324fb834e87a9ca01c0884c042badc01
SHA51280d5cdc7103f0aec5b35cda8dc5b9841aecfe3a572277b3e88c357d684274cfac0ee6dd7454bc0e9b6b0e2e682c0676ba112452562d943b47bfb93134b2a8f76
-
Filesize
370B
MD5c03be574cf0f0d54fac25bb16453ef6a
SHA1a7cc8b01db641e6a0b99d0d080d39d2965dc9335
SHA256382c94edb8545a427daf27ce03f266c01ba8b8642264cc78fd9526842b18338b
SHA512c46dadcdfabc10277145c8ed2538b1f4a2d48848cbeae1990db4dd4ecb36a7c4a62038087ea0b804ed453b3953cbd1440febc6ea5a653ec82cffa5a458dd0ed6
-
Filesize
370B
MD58f922691e284ea508ecd2120abcc48e8
SHA10c4158e7dbe8b0428ae9bbf9ca999920272e52a0
SHA25645797635187d3c82492a8adb51b91ab982c9f9bebbc98a677113de6ab2f5e874
SHA512d7212e45148ee0118b107755ccab5828b3f89f7be1fc224b8b4d742dd4730680535ec8e3e47a5eca3a5e2bb7b490f99c58c827e540d909d570cae88f1daf8be3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD586e7bcfc6f67829ce364245f6c281287
SHA12b5d50033a6610f9fd377f5b3545fa832f3c693c
SHA256af66b7fe8ade6d4b5eff9894da3d139e5fded442739e12dfc020328ff8db0bfc
SHA512ed0190e15abad2e89b60120e72a55dd6d0cb38d8f16fd300cd08453aaeb7b6f3b3b3cbee1db60c9fd9b184a72dd32894206fcad1afc21af7611db121c5754a79