Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
a8c1bc6f90aedb7e36ccfbc183502097_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a8c1bc6f90aedb7e36ccfbc183502097_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a8c1bc6f90aedb7e36ccfbc183502097_JaffaCakes118.html
-
Size
57KB
-
MD5
a8c1bc6f90aedb7e36ccfbc183502097
-
SHA1
a28964d78472555448f4c038c98bc9ed4c2ebac2
-
SHA256
44cacc55032de007df11201528612ba77744366ee94cc5e826100c70d1e0c056
-
SHA512
3ee5323257e2556f80f3ad45f44e6eadebd1ddd21af13763597281f4ed9ed43e85f73522eab2e25f3605d21c89f64ff5da8f8498787c05d8e55be35a087ca83e
-
SSDEEP
1536:ijEQvK8OPHdyg/o2vgyHJv0owbd6zKD6CDK2RVroLEwpDK2RVy:ijnOPHdyt2vgyHJutDK2RVroLEwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2548 msedge.exe 2548 msedge.exe 1052 msedge.exe 1052 msedge.exe 4024 identity_helper.exe 4024 identity_helper.exe 5772 msedge.exe 5772 msedge.exe 5772 msedge.exe 5772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1052 wrote to memory of 4996 1052 msedge.exe 83 PID 1052 wrote to memory of 4996 1052 msedge.exe 83 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 4748 1052 msedge.exe 84 PID 1052 wrote to memory of 2548 1052 msedge.exe 85 PID 1052 wrote to memory of 2548 1052 msedge.exe 85 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86 PID 1052 wrote to memory of 5076 1052 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a8c1bc6f90aedb7e36ccfbc183502097_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9da7946f8,0x7ff9da794708,0x7ff9da7947182⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2508 /prefetch:82⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6440 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6376 /prefetch:12⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,5658111556141274779,5190004404407776380,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD5488ba497e0150e672c34783f7c8c8d33
SHA1cec544d983e05e27d810f8717837bc5740efbd71
SHA256af598b8a7fe9374f3fc98ca0ced1cfa082f41b43d414556b69f1282924c83ba7
SHA5121b54fea3049b87e57ccbd841a8e9961efff01d287bc4ba59e287203e2ef72dd722380e299f1330b529dbc541846fb84f98eaf3df50824137c7951def5f972bce
-
Filesize
2KB
MD52710e5a2479011ed341279182b6ab666
SHA1470b32b57f07eb7eba1bb6a938d3a4b4de0d6fb5
SHA2561a6abd5a8ef22927e85fd3f1db863cc3ef2842167e2482525b496ad826eb613b
SHA512c41e22f304f5174273848bfdc73a02d3dcc3eeb1aa012cf4f8ee17eb9867839ebcbb78e10305191dece8211ea4e06bbe1036a367438761a5f7c0120cdaa2ffce
-
Filesize
6KB
MD58433e6e0ffa7833e7d935e4f524a68df
SHA1511fdb4ff77c5895cfa56b817d888c8d8127c684
SHA256d18727b7ab4680f9cb7af6d9a559dcc67576906210d5e9ada0b01bf2d2c9711a
SHA512cf6ef090f749be2ff909bb6056f66f2e08a6047debc1c0a4635a9a89d40fdf243ab164bb9b3f1c87ff7b917a72d0ecd8c79e24294bcf04eaba02f15a47d0cd0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a0d7a3df-cf9c-40d7-a9d1-b33c03382646.tmp
Filesize5KB
MD53d083f32cfba1d1a18d006bceb634670
SHA1c468bdb4b7c873ed5bec504816a1180b0f6843d3
SHA25662802cec405e1bf9f9f5d997de76d6f1d311ad9a23eda19cf2d2008706934f8a
SHA512aff80258642d2a91dca9332a3183fb8929edc7e05279705966a79aef5863e63045b3dfb91c4664a83ecaa4497054483070860ebeb3e8982cac1bea9924b480bd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a569aab63cc016fd821f74e8e44cfdcd
SHA181a4d04c33c5dc3aff501678444db6d9d315584c
SHA2563f57b1826d0204617ff9ba77db92ef6ed72b821f5a39c59426d33f3a3a954827
SHA5124f2644ee458c4ad83067f0eb8ad2e0c8c461a2e1514fb035f1f3af24b0df2f760875a77187741f7874dda83ac38d229d3bbb703ff24c851d6b2a1c31bfae789e