Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 09:30
Static task
static1
Behavioral task
behavioral1
Sample
8e352c2a7b70958a1418373a69d78860_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8e352c2a7b70958a1418373a69d78860_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8e352c2a7b70958a1418373a69d78860_JaffaCakes118.html
-
Size
71KB
-
MD5
8e352c2a7b70958a1418373a69d78860
-
SHA1
19a2fb1476a26b806745d456c7fb63c3b7220a04
-
SHA256
c02ca3bcd9341c87bcb26626b98b62b3d08b5dbbb708c65ae187a86fa619a3ea
-
SHA512
3ce9f50888285a3f66e94d5396a2520966442f0b6fea3b1091fd16073a37e3653affe9a7db358c4899b6641935cf628ffee67122b14ac3d144ed71d9e05a678d
-
SSDEEP
1536:036HVhU8sf1JZ6C7Flrex3JrHkDz//DYNcB+2QD0H0:0co8sfZv7Trex3JHkDzUNcB+2QD0H0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 1992 msedge.exe 1992 msedge.exe 2352 identity_helper.exe 2352 identity_helper.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1632 1992 msedge.exe 84 PID 1992 wrote to memory of 1632 1992 msedge.exe 84 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 1392 1992 msedge.exe 85 PID 1992 wrote to memory of 4012 1992 msedge.exe 86 PID 1992 wrote to memory of 4012 1992 msedge.exe 86 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87 PID 1992 wrote to memory of 432 1992 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8e352c2a7b70958a1418373a69d78860_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff904ef46f8,0x7ff904ef4708,0x7ff904ef47182⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6116 /prefetch:82⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1700 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1916 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1956 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,10596866605536233618,113033481585621546,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD571b69c43f1115a37244e614c3d60741a
SHA1c4cb0939886d640bdd78c7646ca0c9bab584a6c4
SHA2560ed078e792dcd92ddf8fc502f96a2c93ce5dc1060953a68069b8c55b2926a8ed
SHA5127c5b5f3b97e0e3bebd0eb5d590e0015faf965a5a9819b5d91c07aaa4d579cdf7f083bfcdb8d42dd36ab722d59b88fdf692c9a343fa470e3c7b08aa21c3ed7183
-
Filesize
1KB
MD57b8ecea94fe10f6901d4638b1f5920ae
SHA14964358098fdda6e45809c4f7fcdd3c03df542df
SHA256bb7c27693c6fda7385b47b363ee8a00b036bb582d67afa5253d6a1963081a86c
SHA512529e81aa24ff339dbf5c315eb1880c5967f354e5717e59d860e09f5506e1786fc8d5ae61c2e056354292eb07a4bdc9ea878f22366005241fc8f3333f148e0dd8
-
Filesize
6KB
MD505da04209b914aa114f6018dd3ab990f
SHA1521bbdef3f26564605a1c07e41a0fa900d91819e
SHA256bf2a7f0bd00340f783d13d2b36fa98aad1b8f05e350f467dee18143cf56e8c62
SHA512488d1af31c42f606b091aa24edcf1389750eefc8a9e1fa548d0c31de9ae5fd9552f8f20dcf153d709d6ef95f545b3499e93fb65bf83e5da17718d9f3bd83d14c
-
Filesize
6KB
MD562847157cfe8175bfaad17bbe775aced
SHA1012d4b8dc66d0c0ee9fe446a17d6394774169e8a
SHA25607f5fc8e9e8905f1f796fb98bd7cb6cf0fb6ff2a090f8bf5d7e72236e9d35058
SHA512a2d4976ac37124edcc35a7be3e641b57d9a75ff25973496848fc81cd7deaaed30a82253b312f69846d472422ceab683f5592a2ec7b41e82fab25fe17e22baf0e
-
Filesize
7KB
MD544c4b3d6dc2e1aea7adfb860f2b65dfb
SHA19695c188e9cdca05933b99881a5890238326613b
SHA2567adef13c9a869f1eb95242d1cf8627da4c827ec07b4d3ec6deb46ba556164db1
SHA5127951db2af849fff98f795323bfe5db7ea5a332b3ddf2634b0dc4176941700c2522a07afa728ba8828d17e8afe91e0fc0c56e8fc28bb87c80fa84af45ab25909e
-
Filesize
7KB
MD58353335f5f2235323a1cb9727c45c645
SHA1e95fcb003095febba9f656a6de3616a3e877e000
SHA2565ab393e1098d45f063a1f3294c2114ecd088d780bc7fe5e14acd3b9ff788b119
SHA5127983c403ced79f1473afa1dd9c36284f1181d42471ae4455b7531b74bd42ee0728c2cf96c4bd6f75b79f8aa0c595ab148e9ba7dc94bded099ddd63eeaf5c08a5
-
Filesize
371B
MD5c71d755184aeb038b03ee4f88918c26e
SHA13040dfa5d38001e2b6bedbb5ab5bd348be5d232e
SHA2568dd310edb81e51d02f0eada6166e17501fa3940add872722e085ce1591339401
SHA512cf69fef4013c5617acf07e7901875d18d60cbd676e750916d284f027c3761e57903a65fb3f201a1145a7f6cd7af0dfe3eb927d6d394093569b1ed4b4460410f0
-
Filesize
371B
MD598c7cfc07061583c0757f2a46f56e240
SHA1639e4a20eedc24c309a07ec0b4200be55442f67b
SHA256135ec77433c707d5ecab258be35030589e088275dbe3575701c7d92a01230960
SHA512cc0bf3227f4043a7a35a7460e9b4ad9fdf9d929cbfb9d66538091597c426d7cbb5340acf4f3c0c356961ac9e8418696840d1be5911e4000ae965afc2a0d923e8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD557f26e8b457816a5fdfb533301e3dad8
SHA19508a3f294bc6f5748d3927292e27f2d946c661c
SHA2562bdc797e680300909e3ca278a76df9058d484f537401d553a4c71e981c7d0eb4
SHA51229a03fab0fd4af20e021526ba13ca6f3bdda454b7007a753f672615c45af33090aee9fdf91e660cc02f93ef8b36e3fa8599f8c9e1b80c85cc8a28444c30e0ff8