Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
d4e1647e24950447ea30889dc2add61c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d4e1647e24950447ea30889dc2add61c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4e1647e24950447ea30889dc2add61c_JaffaCakes118.html
-
Size
35KB
-
MD5
d4e1647e24950447ea30889dc2add61c
-
SHA1
c8c312a775b6828279571920baf1de35ca61250c
-
SHA256
31b47dfd3c9cabd9b3c8c830e4002c1bfb410755a653617a2402c68d43ca08a5
-
SHA512
7d13ffa9b254600ffa82919393143a2d8d988081a9e7bba3accc25d9e97d8cef20e77cac822a6df1330e4285066753d12d6ca3f08b020a023e554bf211e10e62
-
SSDEEP
768:y55a2PAULKu67fkT07X10NOZAh9fjhIhSaY62ec/meCI:yDa2PAULKu67fkT07X10NOZ13I
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 2980 msedge.exe 2980 msedge.exe 1040 identity_helper.exe 1040 identity_helper.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 4372 2980 msedge.exe 83 PID 2980 wrote to memory of 4372 2980 msedge.exe 83 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 2140 2980 msedge.exe 84 PID 2980 wrote to memory of 1124 2980 msedge.exe 85 PID 2980 wrote to memory of 1124 2980 msedge.exe 85 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86 PID 2980 wrote to memory of 3488 2980 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d4e1647e24950447ea30889dc2add61c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdd8f546f8,0x7ffdd8f54708,0x7ffdd8f547182⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1828 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6420 /prefetch:82⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7951529825522864807,16473382399729394419,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD550d30adcb7d74506299e776ee2cb5116
SHA19e8e28c1364e8412b339908e6ea3f38e568ebdeb
SHA256a2e9f39cad7cc1170530b515def47ee8879edbc0e5c9a98cfbc399c9e2554f8b
SHA5123422dd4155a2b19fa275ae4e876ec61cbc9d35de503c4e326d438bb9c5461a9a2f256f8c152ca2302ab9531d7dad5d180eb489a4d5a477e144eedf465c59fb93
-
Filesize
1KB
MD5350f29fd63c824cc6b4ce0fda7af5fcd
SHA17044e43d790ed508fdf226601e04bc08b83ea3ac
SHA256063c27affe12d61f11ad0e1e8fee2a048494783cc2c51335e717447b71a0af58
SHA51284b23b061608f807c2dddfc80b0234f4e3e4d487fb4ca14a4d9af1b42638791043054f94fe4864edf046cbf1b028f06d67ea710ff003ec1c6282ff8240225734
-
Filesize
1KB
MD58d0b893c9d51ddff0752075ff4a9dd67
SHA1b53fa9a8973eb3051437695152c366dd19d6aadd
SHA2560a0e9834ab29423d5c171024733f1e6d87c0d7508edf14a6b88b11be0afe7fb3
SHA5123021f7d53b1fec85d91b008a82b181ba618ea99c03c9a3c271ab4b4f4c6d17644cfb087bf4d0a3376cbaa71de4aba3567bf929cd4d83e6416a2892f10aad41c8
-
Filesize
5KB
MD51a1c80b25e62ba8ab44baf62b4c69de6
SHA1270144bbe3153b434ffdf7339090f22dc84106b8
SHA256c06bd6fd2185d6268e1af2012b6bf363f35eb18d374cedbbee4a794108de7895
SHA5129a8fe0a79cd369dc5d324fb8ff83765696c3afa07f63004b1a83896aaa3aa642efd1e2b626a9081ae485fa4ca5316156dc579d63fe59b97c6786d87fd94887e7
-
Filesize
6KB
MD528412e23e03ea56ad5e77f0f8ac45018
SHA1a8cd5fa2caf67c82efe883b0a09e9e6b109fd59e
SHA256f575b1a49c6446e7321e61966b343f02d10b83ed90c4d01396a711a84ac74332
SHA51256f769712fe13f187bf7804562951680a1798e775e2083e2583d59cd12d3f00b3b243c034227de6e5fa8c91b9bb010fd5967feb6e794e369561343f9250bc992
-
Filesize
7KB
MD5ad745e521f961cedc05bc0082c472ec6
SHA1c3caec424f5395587184842157dab92984cfdcfe
SHA2567bafc964d69b1e0c3bfab3ec3da5e7586754edecbfe86a739c16c468de839c52
SHA5121769d49ba4f71750be22f59404db3e227046b9cfe4f16679180c5bf5d392cbabcdf3e52100a5a0e0cd874fed78c2bc1686145196c03f1d08e3a25630469dc8bd
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD59e0c707c86939f1fd9c1d6b94ed876e0
SHA1897aa8b75b4ec0e58f575cdf627c6cd6bbd53955
SHA25638e31d556e685ed1f28c108c46ed2be7eb9c55f90686f9265273701f6072efa6
SHA512bf02fdc2d4b5267030300bd258a2b227dec672e2e6dd3422865399c3618e5bf8a489e8c66eeeb4d7e43fe78917c5095eaf8b41468918acaaea425326fdfc5c68