Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 16:49
Static task
static1
Behavioral task
behavioral1
Sample
d6ba59443f8a4bca217263aee9f1faaa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6ba59443f8a4bca217263aee9f1faaa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6ba59443f8a4bca217263aee9f1faaa_JaffaCakes118.html
-
Size
70KB
-
MD5
d6ba59443f8a4bca217263aee9f1faaa
-
SHA1
103251de41399e7e3209019f1e25dfc48c150f67
-
SHA256
6e1200673860d284ad3f34576f293d4cde6f65e5a4390b934095f783569feec5
-
SHA512
e8ab9b29267fe652627a91c10836c4e8a5c5688b6d2368a36c8d2a53ab6e4d9fb8850b6f2094ad460f34b0b8dfb5846c96439b9ee786615051b4daa532737095
-
SSDEEP
384:XLC0ZumyqfCnMDdDt3wml7TNsLTnDn+IZbr2BrDrHdCJ5rxgoibnMQDEQX3ch7Rn:XLLuq4UJ3wml7TSib5AiS1GC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 4420 msedge.exe 4420 msedge.exe 4556 identity_helper.exe 4556 identity_helper.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 4048 4420 msedge.exe 83 PID 4420 wrote to memory of 4048 4420 msedge.exe 83 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 1976 4420 msedge.exe 84 PID 4420 wrote to memory of 3048 4420 msedge.exe 85 PID 4420 wrote to memory of 3048 4420 msedge.exe 85 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86 PID 4420 wrote to memory of 2140 4420 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d6ba59443f8a4bca217263aee9f1faaa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8dff46f8,0x7ffe8dff4708,0x7ffe8dff47182⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,12796626795101412464,3866235694880164298,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,12796626795101412464,3866235694880164298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,12796626795101412464,3866235694880164298,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12796626795101412464,3866235694880164298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12796626795101412464,3866235694880164298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2152 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12796626795101412464,3866235694880164298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,12796626795101412464,3866235694880164298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,12796626795101412464,3866235694880164298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12796626795101412464,3866235694880164298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12796626795101412464,3866235694880164298,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12796626795101412464,3866235694880164298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12796626795101412464,3866235694880164298,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2572 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,12796626795101412464,3866235694880164298,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
23KB
MD5a0423f1305547bb6b8f5a4fb1a9fc2d8
SHA1092dcf1fe57e6bb53821eb754e04188ee70602d5
SHA2566add651cb411ed9ce9a17883c1522920a6ee3b4eb676f5b411e72d1a5e7de6e8
SHA512b8487c60b40d332e562cc5d4fc7c515e3b3c2c82311700b788905754c1376ce6f0da650583545a4691d51f04ec5da0c0204997214d167c85b788d4c85236c4c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD574011da00831d3646e682dcdebbea29b
SHA15b1e9fe64562cc43db0ce04e1fbf78e99e70977b
SHA256145750f04c9f2f8f22a3778233437dcfe52be7ef8bb8da77e4eeec25c0466e56
SHA512c5f206df6cd5530b182ee9d431b587582cf8a68353ab75c130f51366c6e1e80a3b9371659868e3eafcebf52fc297a6466f0d5ac1603845ff9a6df566f20fbb23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD59c840036bb2e318a862868c5234ba84f
SHA1729acabfeb5149add469469290c43197306e23df
SHA25613a04c1a5fc9affff0a2a2625d0768da855791a98354d7dd2532fa5d83a15468
SHA51272df5f57519dd29c11258d456a5d8ecf810a31f53086f07650402680f11343568335b710e2ff96d826e36d5bbe992b86da097d76cb77f0450c6805f87fd669fb
-
Filesize
1KB
MD56cf56e87ba893ae94fb602e2b42a9aef
SHA1ac1d166b0e9783c4521d26dc5bd33aa28e717ca3
SHA256bc72824a849e95c46e2c158497feb042e9ab7f953e8188df06c795c956a47de0
SHA5123c0023babdb4334c084775b1784e33838686ea6a07c615cf34bac0054dfb54cbd37af1acaff93aca35353e96f8cb74839970b6282354e7a84636a66175026921
-
Filesize
987B
MD53f2e97a41e5104827783f405a0ddbac1
SHA1b4412b2803c3ea5a40fe28731a9d5a33f7a972b0
SHA25605c2d3954ba7e68aa0334509df26b74bdc88d070bbc37d42f5be273137cd22ec
SHA5125ec9bcfbe666bfb89343a1fe32cca41343f04a02dc99ba3cb1d3520feeb241246b60f7ec634082acf48d131fdebf44494fc779d12281a1b6f93d49951ef1dae7
-
Filesize
6KB
MD514a3fc8eee2ce8b02b8fac9df7737f62
SHA134ed4cbbafe763ba5ae82fba4e9738ec31cdc34d
SHA256b3b5e2d0ccfb03a47d11638e2d704b22a0b1c4edd731113cc970cc2d0e752ca1
SHA51229cd714631ab07f18ab9acc5a7c9a610a96a988e8446f271fbb5fb1b21c307f77b11f365c0e89791ef74e2c550c23e04a697875d2f20ea626eaa477e03518925
-
Filesize
5KB
MD5cca96207a0712f06aecd89896904811d
SHA1e0716d0a14fee14082086f9c80c8cffee186a8d1
SHA256893c4338b7ed236bfb9c2c6d08e68735aa117d82e0c2f7525ff7815e25fcff21
SHA512b297654c4a58c782f016e2d97416c7c792026ec89d8109bd9ccc2931cd471f256b55405ca1651b95deb86c29dfcf242e200e818dcd9f9036a3168a31e74aae7c
-
Filesize
6KB
MD58e3de57e4d4441879fc5693a10b5ca57
SHA19b8a5a17b5fd1b9b26f7f6a82b04220bb6f2eace
SHA25675a56351df900b1ec52da114f19be619a62da7d1d486f95772344a4a9efa24e8
SHA512e64161ca4874ad1609dd958c2f17a65f994338b798ff362492d7d5323f25bfb7464c2d150cb7503bc146589c3a19d410463ea095a2880b8a4ef5542cf7a0397e
-
Filesize
873B
MD571c9a87742c1722352c9c32d44776f02
SHA18110b23426145cec456115e236509445f1e40127
SHA256ee1ec7997ff58de86f61ba9fd3927c7b9d2f533a8c1e88f6f202e7da7e75b7bb
SHA512cb3b65e115398f962c662b864c97ac3df16b23850c1aa90ac96362ef02212bdd897a116b71fad16b5ec349fdc2910d4e08baa0ec22370c36be04466485700a80
-
Filesize
706B
MD5a596e8b2c457a6a961eac5c3caee6486
SHA1586deb6673e1648052ce0ce5ca354dc17b72d796
SHA2568a84cc4f61a4054a97d061d80e5a9563145e55ec656225dfbbabc1ed0f47deea
SHA512c7b3f65c5455e7d0dbbbd3d8715cc7e6afba961c0afaa9c5d0a007f8d2e0e7d4edef421f91ba85c07b57b7228b6fba576d08a62a4708e10ada2a43f29b15403e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53ba2c0b359f6371aae5476aaf398502e
SHA174314811b24ad18b8078329197fba23a91e0d7fa
SHA2568a11c4ae3f9d8c13767645bec2446e95e74482f2867e39ceb91a1b014c9ff97d
SHA51256115b5512f962e6cc7c9b111dd9f3787f37ce58da536434e43224d50f25e8f9e4836515723630d464ed54190422bde5a1ee9add6ba9d2f9a2e480d0e92fdd4b