Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
dd527fa6a11c758f51667bc7fb8036c0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd527fa6a11c758f51667bc7fb8036c0_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
dd527fa6a11c758f51667bc7fb8036c0_JaffaCakes118.html
-
Size
88KB
-
MD5
dd527fa6a11c758f51667bc7fb8036c0
-
SHA1
b94e62c20eb7579ec7e32fb407c8939864c1f9c0
-
SHA256
6fb59cf2c616a8d8929f0dec1c1a67cac1b4786b01aa90d3d9e4a43ec931ef56
-
SHA512
f0257d063ce98dc0a29d761e481d83bf48d817d678968a8b025fc7629d7f771af821d76867b34b093e1d8481ca447ddaaaa6936ffbbd363045181f07eead980e
-
SSDEEP
1536:Id2aVJW6OvO5O2ObOl50GqLc80L6UEhG1b:UVUBGIdyl503Lc80L6UEhO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 1624 msedge.exe 1624 msedge.exe 1360 identity_helper.exe 1360 identity_helper.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1908 1624 msedge.exe 83 PID 1624 wrote to memory of 1908 1624 msedge.exe 83 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 1828 1624 msedge.exe 85 PID 1624 wrote to memory of 3668 1624 msedge.exe 86 PID 1624 wrote to memory of 3668 1624 msedge.exe 86 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87 PID 1624 wrote to memory of 3484 1624 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dd527fa6a11c758f51667bc7fb8036c0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7e2246f8,0x7ffa7e224708,0x7ffa7e2247182⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7114082724843830322,18162803927470674495,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,7114082724843830322,18162803927470674495,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2504 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,7114082724843830322,18162803927470674495,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7114082724843830322,18162803927470674495,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7114082724843830322,18162803927470674495,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7114082724843830322,18162803927470674495,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7114082724843830322,18162803927470674495,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7114082724843830322,18162803927470674495,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2628 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7114082724843830322,18162803927470674495,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,7114082724843830322,18162803927470674495,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6336 /prefetch:82⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,7114082724843830322,18162803927470674495,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7114082724843830322,18162803927470674495,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7114082724843830322,18162803927470674495,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7114082724843830322,18162803927470674495,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5ffd678a4a4f03bd57348579c6df42aad
SHA1d1a1213397d3f16048272773a1f35e21b5a5fb85
SHA256a1cbf393b34cd3b8a870d7635cc54eaf44b40bedc3bc5447302bbc259b3a642c
SHA5121a09cf2d2ec10a0b335b06e8626a297bbb1f5db917e400184d0005dc27373c301cecbb0a1fe543bf83be40c4c8e12c52ac17f804f2d40468401380ed61bca4f0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD51417dbf0a2087f22676a463e1a47acf3
SHA175d8a2b8b2c93367368259549a4ea4d40578296f
SHA2566b75d74e0cd6c78dd1a7a52c66618768cbb94118344e2169b519fb5726ea15b0
SHA512e608388092d24362e09c6626f258fb10d5626a33d91eb93a8543d913c8c4e73d778022cd26e82311c21dedbdc7a369d056025f02941c9179b2513e8ba3ea0ed3
-
Filesize
1KB
MD55b2de1e70e26071dcfb80e0c6d12cd5c
SHA12626060cf9126e0ba6ed15124fb5bd5b1a6c65a8
SHA25679a5378e3e872010d417968997689eef014983a0046464dd7914cf0d8d635798
SHA512905300f94dc57bd27a94a37b996802df536d10ca1386c4fbb7e6ee706a7b2f71853ba41505949a44841b47160722d61d383fbe79e6d9bb93231edbdbb96ec126
-
Filesize
7KB
MD59c7adaa691f295f6bd99dc699a2e05e3
SHA11c04dcb2e7b3d7351547508889651b37f41dd233
SHA25638dc1562d7fdb34468170737a79a79406967100c0214dbaf7ac674eb253c2c8f
SHA512de1ba5c2465326acf6edb49dab611da3c35b7f64bdba2d510add88459e5fc39c32f6198cc9c8a07bd971a3d9d9971888cce081014794cc339f960dfd2dc30761
-
Filesize
7KB
MD5ac5d16b1311b2d7c52c6dd0549144899
SHA181c29d8963886edef7fc6f98533786787f722286
SHA2563af44f437ba6b3f60ce3574d884773eb2239ee039c58666e78b5a9128e6fe4ba
SHA512d161abad429e227ef26e1beb44cdeca16ba3406594d9d85069182ea6c0ad75e946aa5fe34b82c5857304850c84fc90d3646357d3b11fc7264bcabf6294576539
-
Filesize
6KB
MD51bdcee737a49382e86c9803b32766568
SHA12294e2d8c64d1592105ec45a1f3c185bd4cdb3b8
SHA25642f5e100f2e3caa892208c6244c0814fe6f2da69d1b1f06eeb5fce3980254360
SHA5121ec4f60d6176ea7c80facf8df4477e041d605870442c4be7c8debe8c6b2a8a52ea8884462ff7b62849865a42645c105cfca47419ba39cacaa736f7751f8044ab
-
Filesize
7KB
MD504b4910f3b3709a58cbbecb0c4ee3855
SHA16e70319dfad066a08aca6f738631ab521f249693
SHA25607e538b0b93450fb447cfa522f530f7d3e242452ce10c81d13b56c1a5259c94c
SHA512fee79a3a4857f84e0fc1928037890094f652f2d5a1739e177ccd9204205e81ed9dbdaa33f30828d48497ded5f47802cee46240de1603b267521a12836cc06bfe
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5e0ad072084640818e68381725a410dcc
SHA19aadbc017f9b1f4e8c2025a1941ab9c5e17832bb
SHA25664043ccebaed4dbe03ce8efb1f338a543f6b6f80e29eea56dd78f6d5ab8baf91
SHA51229e711cc96e8af7fe8ec7a6e2fa6f6b85242d06b9cddf3d6909c31cace94a712ea6ed49b3cd855bafaa90f3761e8d78328c0fcce96eaf71a7d1cc8414de09d81