Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 12:30
Static task
static1
Behavioral task
behavioral1
Sample
fe877fde5ea43c2236d3e0e719571bc5_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fe877fde5ea43c2236d3e0e719571bc5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe877fde5ea43c2236d3e0e719571bc5_JaffaCakes118.html
-
Size
199KB
-
MD5
fe877fde5ea43c2236d3e0e719571bc5
-
SHA1
d54c3ee3f966f48c57439ba472bfee0b51806332
-
SHA256
a001b67b0f51f257a1b1341343e35ca4b7c23bf1b229ef8a971ee9cadbd9f500
-
SHA512
bfafabdc026c629ce83a87e48dda073e737e972feb3dc332b40744db6f52d0d08a58ac3878e21f0660fd018c28aede47c7b3470b82979db6f75b7b632e52d8f9
-
SSDEEP
3072:bTGs7eApBtoaULEiWC+gVZ4TDYgwJubQwv:bHPpBGr0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1888 msedge.exe 1888 msedge.exe 2032 msedge.exe 2032 msedge.exe 1060 identity_helper.exe 1060 identity_helper.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2032 wrote to memory of 3392 2032 msedge.exe 82 PID 2032 wrote to memory of 3392 2032 msedge.exe 82 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1064 2032 msedge.exe 83 PID 2032 wrote to memory of 1888 2032 msedge.exe 84 PID 2032 wrote to memory of 1888 2032 msedge.exe 84 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85 PID 2032 wrote to memory of 464 2032 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fe877fde5ea43c2236d3e0e719571bc5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8234d46f8,0x7ff8234d4708,0x7ff8234d47182⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1852 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1716 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6429053851816370927,6274939858285523906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:3996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d4829218222c8bedb9ffe89dffd37095
SHA1aae577f33f413ec3d09f2e7ff5d9cc20a602241c
SHA25649239b229a2519583ba5d6de3702480b8a8ebf3cfaa8945100dbab25fcb02b7b
SHA51203e26a2e3de41b8a829b5543da504c7d7ccdc4c112d629efcac24dcda23acb50a52b5b99572b5efb2a01cf392a457cf9fac85663b3d63f7606be00dba218f8f1
-
Filesize
152B
MD515e9c4b4eefb3e1c08a010e748e10f58
SHA13172378f2c7a00553ce086dbf53fcf3126c5a724
SHA25607b56a769467e8b57f9b7acd9d32da266ca5000803758c18bb6818ac236c7000
SHA512811058b539e914a812c88543bb6657de736f691d18d6dadb5e1f6ced286780fb334dc5f575babbcf4fd2dceda30d1bf4004b374c5775e7f278346b100b29eb7e
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
578B
MD50dde7604e49a85115979facb8fd34fa0
SHA1fa3159a394e00125841f0d62b1234f8fb733c6e4
SHA256f2dc6db90a79fc69a761e9b6eb9c10b3c37367d5a6a772be9f70e3ce80368831
SHA512c759c9646211c3446cf0a57246f6275c92325a181987b49f627f52ae5f0796879e313f47c384ff5f480a4e9352028664b1b94fc346b4a7de9fdd6c4404954b33
-
Filesize
5KB
MD580b2949c786d01831a2e39e41ac05d9d
SHA106b1d27ba1afb537ab5db29dbe41c4d3fa5698c9
SHA25663bcc0da20fa2062b681ff36eb28f2685952df7b3db27e417edecfc27db12f78
SHA51246f055b13c6ce1cdecb8221cc9c137c2707de5c9405a2fbf65c139cbf359cc2cfd1bc76c7ea898579108a4f577ed8a7f2312ab633c900815f2dd3cf411e65549
-
Filesize
5KB
MD53352733c8951dfc8a44d1e1fe061d076
SHA1e7a812ae35a2db16e34c256fcdd6794af6133a46
SHA2565c9c962bcd89d7868d63e700279bd2c90dc1779338d5723ff6f1a72f70a13658
SHA512d2b6a35f2d06c68a94f58562f92101916affc798339e067d3a704c23d9cfe70f42c22fb4c9c5b97820745ea6fb42fbf603e161a2c24ac9e6dc32a504563d2cba
-
Filesize
5KB
MD583c72ef3e682cdbad00e1f441394f7c2
SHA1ccb51e5aa5e8d936dad06baee4aeb65310ffe690
SHA2563aaf0cad1a79efb78e52830ec0f49155680c57a544a34eb8d7d804d756c04447
SHA5129a2fd285664e2531dc4a26a752b79892f257ad2cb2e84e956a39e2ebe776e5e98789f8a3095731a48eb73815ba7544f29f2b92b8f6082123136c0a11785ffa9a
-
Filesize
24KB
MD57915ba0545666aa5833cf9f9f86d45d6
SHA1743ecc319bc2a54973582d4a5198042a48fbe8db
SHA256f8fcc045da13bde0f5dec3ada86342105cbff34ebc2442bcf51e8ed509a95b20
SHA512a53036251a22cdc95579ea8641c5574f1dc1f7dfd0390f00ebeafbbea0c1a2c0c3e6dba23bbbb8d8e2c77a3e1e816ccfaf84a97da1c334019c8df1414999d1f9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a9c3b258fbb4673a22b031219d283df8
SHA10bba8cb7d86429ed781b586a6e86734daaf4c773
SHA25639cef1bf6f18548195625d26c6b000e5c4ffff18cc098c97e7161b62ab37a2d8
SHA512164308b46847cb55652b69f1be03e4b47dc426eb9dc0952b5ffd99edc82051bf25522a03accb226e4460e84556f468538703295b9ac254e2da5aa1e0ddf14da4