Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 16:02
Static task
static1
Behavioral task
behavioral1
Sample
dab6c325b27802abd772c074fb71ea6c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dab6c325b27802abd772c074fb71ea6c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dab6c325b27802abd772c074fb71ea6c_JaffaCakes118.html
-
Size
119KB
-
MD5
dab6c325b27802abd772c074fb71ea6c
-
SHA1
4cfdf2553adaed57a8a9a7bf38b79508c21caf2d
-
SHA256
8d7471ef7899c11359e1b98d1db5e993cc77fc7147e2ce361012beb624ddb138
-
SHA512
5981b6a23466d86b7ecbf3f1e7d6292c0df95abd8aa351744d76da101ef93c5d3cdca94932ba15d8063f31b0fca96082d54f8a8e6f356a8185ded36577cf78bf
-
SSDEEP
3072:tO1yn1WqgU5+eutApdlUqLBXt8KNIb0AgPcG9lE/sMBH0Ze:iMt8KNI4ZS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 3248 msedge.exe 3248 msedge.exe 3776 identity_helper.exe 3776 identity_helper.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3248 wrote to memory of 1968 3248 msedge.exe 83 PID 3248 wrote to memory of 1968 3248 msedge.exe 83 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4904 3248 msedge.exe 84 PID 3248 wrote to memory of 4360 3248 msedge.exe 85 PID 3248 wrote to memory of 4360 3248 msedge.exe 85 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86 PID 3248 wrote to memory of 4016 3248 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dab6c325b27802abd772c074fb71ea6c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd83a46f8,0x7ffcd83a4708,0x7ffcd83a47182⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,10321036721967454240,11774371169606468833,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,10321036721967454240,11774371169606468833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,10321036721967454240,11774371169606468833,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10321036721967454240,11774371169606468833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10321036721967454240,11774371169606468833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10321036721967454240,11774371169606468833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,10321036721967454240,11774371169606468833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,10321036721967454240,11774371169606468833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10321036721967454240,11774371169606468833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10321036721967454240,11774371169606468833,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10321036721967454240,11774371169606468833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10321036721967454240,11774371169606468833,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,10321036721967454240,11774371169606468833,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5efa73d919db5ef6b1f8d01782599f466
SHA186ad5bc6af727d6f8906ed588c6a1886961883ca
SHA256ad2f7cf704c8cfc2b68d1f985e46d1f682b892068b5d309658887ea4d68dc893
SHA512731d9c78e087cbfa8d006873449407e7f650ecc47fd82e297fce8fd4a1e7902d715345e4de1768d6ed0cbc9228e6e9f45310b16280e2835a17ebb237eab04d3a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD529df018d254f3e03ed5748b70cc70062
SHA1da03caf50193692a4abd14d9a9856d30a54c0f0b
SHA256ba1f0ff6311cdd92ad668b2aeca4726608faf6237a0f93956e34611ecb91ff66
SHA51221299d151af27c9f929dfaf0400f3aa9521703caf208cd0e9e04db6d5831c10b67001a283e905ba8695eb26e59290b510ae0d43006684d6c66105809c83c0b63
-
Filesize
2KB
MD5a2fd3d5411faad572effcf2aad3f8aac
SHA1bfd6269693205c39634ef1760969d345b42f069d
SHA256b93f057ec277bfef0e64a0b41ebb4d635369b3f99cca07668867b6b4a5892c08
SHA51247028954e9f7bc6d0662d0629e6c4f226bf359b95ab76a250ecd58a70d21b719b4b6853026ecc9b4b715e13b1c9393f3986cd8065d2804e0baf4924e6f747fe4
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
7KB
MD58844082c67313b35b8f63e8ba7cea548
SHA1ac4f6ec494dea85344dbc0eea2187e35f9a67649
SHA25607822356fd4dfc814d47db65153dbb47daf3d3de734018f23b0483343d8524a3
SHA512c350b326a123d6ec5994416b5985304d2e3c98fea3e69344ae5022c45c49d7194292631db45cf6a183b91425e16b367e1b446f2e4c5552e3b6a1868947155307
-
Filesize
5KB
MD5c1857ca9cef268599bacc1b1f93b10b8
SHA10fda11b4ec2946f7ed096ac4ae294d432691b99d
SHA2561f572828b0fd9966a2252adb1fd01841435d7578395bd798ada452fd92c3f9cf
SHA512227aaffa1f309938411e321a2920fbe368cf2616ab9d2430ea7cd2db6866f23cad5be1ac84a8cbc3832d51b13b5c4a64d8734a3631e95d19233820749e316ae9
-
Filesize
7KB
MD5f9454bcc4d2cea26c20afab42ce2f34a
SHA11fef12dc418f83a9d39001aec6cd9863071ebabc
SHA2560749f5ff2f8fa911515281ff08f7213ebc3aeec1360cbd556ada06c575a1d012
SHA51206b97d56042bc1fc7e2d1fb541dd2f77a18f1988d6ff9b8e95669a558f15cd8b65b1c8562ffa51ac37b2ac278d17ffd38f8ab902dac853dc8ea61827879ad3c5
-
Filesize
6KB
MD59f767165d8a0675bc82d7570e240c37b
SHA14e830265165324e8a074f8aa076ebfa782b19df3
SHA2563f355eb6df6431efa95dc6a1a90c7ea1d84f64da7a4f524a5b589fd01d13b809
SHA512fea269eea5dc248fb5d988f53741ba1451fbd03c4edf0c9488e46fcd1880344a06d5f2db8918ca96e0a7c475ddca2e4846d4cf69b66b1296dfe610f2dedb1e62
-
Filesize
537B
MD561779cdb94e11cb78668f9c6a10b7faf
SHA17c0cb293ba04919d9ca2b4a7b67c19f081055f02
SHA2567b38d038e5413e52aa0cda4cb5217b362fb26068daeda0f321527e5b4ab0ece6
SHA512843a5c2ff37b619d14d02f92f49e14888fac6b401102a1cde208c0d63bcc043b2e1dc2097924fee0437f22db573308772d623b76d5f3a4f61a0c9375daeb8129
-
Filesize
370B
MD544c00e308ca0917d5fdd86058e3734b3
SHA152cd72d4f433cfaf86d39fed46bbd4e978f1516e
SHA256a5caffa15f24c44753e52c259d309e7879da7185b63b1447b1ce879459304eed
SHA51248ef9ed1088b102b4c6aab6abbcca66df215f19e352859d64e1518e71b8262e3d0e28898d340d3435e81c3a270ea06d46558ca3fdf06bb1aadd838b982351613
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5563322a30f9dab16abba4b9ceaaf81ff
SHA18b7f847336e42e13d49bd50a989ff06f2919c197
SHA256bb262a3bdca4f172a6e6b3212385b8595e67f4039856e202b9b42ba877b2cb9a
SHA51220607fde46fcd927c7dadc16b14bdd1e7f4a3d3f647d5ae481a7002761a37d9b26fa50999df8e82b54ed331a77d7935cb4b1b2ba74e8e35a4ee9fa7776007972