Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
eacdbf7d456454fa0c0fe62d6b5b30f5_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eacdbf7d456454fa0c0fe62d6b5b30f5_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eacdbf7d456454fa0c0fe62d6b5b30f5_JaffaCakes118.html
-
Size
50KB
-
MD5
eacdbf7d456454fa0c0fe62d6b5b30f5
-
SHA1
3346aa15511febfd3f77076ed93d2e31fd0be02d
-
SHA256
6f60527837d79d978679d25ed70d233c3d7374e533fe80ce85611a510b985af9
-
SHA512
e9e32fd42e62bc2657c6e3c1a12af37ca2bb81b35ba7bf60b668057e88f56939f0bffb00cfd0818feea8d271c0f1c71c553c14f6cfe142fcba8d571911c85d96
-
SSDEEP
768:rytZ6zqu+tpLv2jUsSCoT9a2M0jMwF+5WgovBBnMaFT3wJs3s6NV29f6Ip:ryX6Ou+tpLOwsAw5Wgop2s3s6NLIp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4076 msedge.exe 4076 msedge.exe 2256 msedge.exe 2256 msedge.exe 1092 identity_helper.exe 1092 identity_helper.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 3272 2256 msedge.exe 84 PID 2256 wrote to memory of 3272 2256 msedge.exe 84 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 3032 2256 msedge.exe 85 PID 2256 wrote to memory of 4076 2256 msedge.exe 86 PID 2256 wrote to memory of 4076 2256 msedge.exe 86 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87 PID 2256 wrote to memory of 316 2256 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eacdbf7d456454fa0c0fe62d6b5b30f5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe69e046f8,0x7ffe69e04708,0x7ffe69e047182⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2484 /prefetch:82⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2448 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6552 /prefetch:82⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2044 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,8568028327187169268,2173409620631239285,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
23KB
MD5c897f8479da25ec570027594f1b4db24
SHA181a3ff06cf35a87e697fc4733966dffc270ad06b
SHA2567fd05e325904c9c31e435d5c65b9b4ffa11a9116d1df0282d6cd7c87ef6f1dbc
SHA512b1c1c46810c3bc5c407f7d30a9d74db8242860965d958ffc5bfeed35b1204774843775ae81b8c414ea89322d00d7ab97313965e20cebba588edf13b9b8dcbc10
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD50b6546a90d91ab7b61f07e1eb96bce07
SHA1b5ac306dbaec7cf916ab9b905dad421496c9fe80
SHA25654d327cbbcd5f22c8459826f9cda54c583369b5d69abcb4c73b03f587786b508
SHA5121c77205ff2f4d6c956bfbc082f559bab3668c3c1f82c896cf381fe93e4404a8252c2d6ea5273e9910d8039c9dd63cc114f8262d83923555874d244ef320a3f81
-
Filesize
2KB
MD5ab5b4c8b5d3a9f0106f5c65be5388569
SHA1aaa3c9eb0663b3efbde7f09361ba80b5a36f7527
SHA256d9acc741a5bb388f9b1a00c745b2f36b346d6e6fc6f7a8d19117bd81ee65e667
SHA512b9f169b5289abfacb436f0483efe35e9179b6cfc622e13b3ddd53af837789b6d1a0494fb6e4849812d5a7f4317fc08ca64d343207f6943962300994b3e6a9ed1
-
Filesize
5KB
MD57b3357eae0a29539876e1117344e6584
SHA1757bb7d7b02c65b9447839feba5c4c02544ddb42
SHA25690366597e8bcf98e21f6cef697f0601aecd0b7880b21c7350a83f8ef3b44ad33
SHA512ee85de9f4c830c3df5f6369fe1f40e118d0fc5a30e6f4a34402d91155980eea9cb0509a6dd3a09fbdee7bbf413e8fcbeaec74557e3ece718fc80149558ed6466
-
Filesize
7KB
MD5cd41f01c541e9ebf7fe7793816840a20
SHA16f0b253aac7327f6a140aef367255f9461569eb1
SHA256d2d226c683ea4f0a3619c3773e72e93f890da77484eec09406ba962d51c5186a
SHA5126543997b440a2ef746d3907717ca259b736165784b351fd96da433eedc8afaafc14b1286f2f0aa4fbab98af5464218ece6449ceb7c274d235d98248510090b1b
-
Filesize
8KB
MD5dffdaf8957c21738316dfaf4d69921a9
SHA19ba789374dc11a7cdf13cff4d4b53829f0edc789
SHA256a225f368ff5c02f255a3450bc68ddb554883fedeebd93ee18633a6673b1eed09
SHA5128c64596a0e419a07be5ebe3865bbddca961ad87648bfc1fadce6e9ba5aaa0711875b9bfaf61abde71723aa6aceb51fff36c64e0486b0756b2ed378c225b3b097
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD595a73b069262cbeb2a4dd53e294a9d6e
SHA1e8f98dd1e390f676e82f22bdd474eac426cdd712
SHA256308776c51118b5f17830c163b5ca33f2244079ceb2a75562b6d2dfa95b8c5a98
SHA512411f519cb1db1f5d4f4c70be64006ab882ec0428b1e92b555cae37a767acd303d030aea4e9ab2f25d3cdac01bc5b097d2b67fbcd3f22f402007b30a1753a3d10