Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
25c1f3b56524cf0bb7fee752eaa13917_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25c1f3b56524cf0bb7fee752eaa13917_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
25c1f3b56524cf0bb7fee752eaa13917_JaffaCakes118.html
-
Size
430B
-
MD5
25c1f3b56524cf0bb7fee752eaa13917
-
SHA1
119f02b3a8700fa64abed9cb80e932a2f0346f08
-
SHA256
65d337ecaa891cc8e65668d89cc8ee25f12f7179f72354dca75fc0a6ce7220bc
-
SHA512
1fb2b6ccd5ecd69a3fb26f09e64aed8ed82f655848ddece376c5a12af2b5aca7cce0dbc69e5fc50f0f0f0ec2d4160b37f67c054649ecbd01163b5e3c06059407
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 552 msedge.exe 552 msedge.exe 1072 msedge.exe 1072 msedge.exe 4124 identity_helper.exe 4124 identity_helper.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1072 wrote to memory of 4080 1072 msedge.exe 83 PID 1072 wrote to memory of 4080 1072 msedge.exe 83 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 1564 1072 msedge.exe 85 PID 1072 wrote to memory of 552 1072 msedge.exe 86 PID 1072 wrote to memory of 552 1072 msedge.exe 86 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87 PID 1072 wrote to memory of 2676 1072 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\25c1f3b56524cf0bb7fee752eaa13917_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb504b46f8,0x7ffb504b4708,0x7ffb504b47182⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3668 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,17870218846173676873,16032877569392591339,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
343B
MD5b6622528cdf558d8cd951efae72671bf
SHA1cb368bd7a72a47458aa77477addd4ed3a3693dbd
SHA25620cc8f40b22de076208d755b5dab38a2fa253cbb679cc6931b56cada50b7ce5b
SHA5122d1fc64f5384b93280d702e26a029dc219ad5a2837f8176a2bea8c0d52b3b9e7f64cf49c996710473dc809539651c895c0727063f357a35f70c4e304129417c2
-
Filesize
6KB
MD544b5fa79cfa8e8ab4136cc48f32ac46b
SHA186ccefee97e46af3427c6f27525d135d2f8b152d
SHA256aed95da1639501b8014520837ab2f1f177a7e5696d9c0ec40964b31606632799
SHA5125229f07a3ac900e445e45b6414871d8a9cd0a7e2951f785af646f8b4a14b2ac1b4908e870c273e921cff1f5c0584f0b697250f654d6218b95f5d3c5f053e2deb
-
Filesize
7KB
MD5d6c716337f26e72d72cce8b7024409f4
SHA11fda76ac733cc70e51eb643f39f9dea7e3f0ae90
SHA2562614cf0b074802a7b494c754373f002770d57be89068f679570d1f63df685ff6
SHA51246b500b3b5e5bd63d2524dd2f7ded9aeb2e9e0e08587737d1ac0a84d4be24448c43c0929bedfd86dcddc3169d63911acab1d71d91f0d254e028822bbd64f5b14
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD59114f5d32338fc93835e6348267d57d8
SHA102a7c0b83dcbae8461f97fa880bec65a0d493096
SHA2567c5c6d28bf169c96ac20db66b98c2aa8ba6ed66d1d09b7f9bc562f9a7a10a492
SHA512bf1c839a17c104740d4f39a76077760a1933873ee7dde2422b6435cfb018bbd5954403fad0a4f112f452d7fb2e3107a6355bfa4e3f52ede680e9d54077eb12d7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58240d.TMP
Filesize48B
MD5e49d82f60f09ad67f9fe45b40a9bb657
SHA1f4b1b3c0e0ac8a4ad23bfc98925a5436e16aa3bd
SHA256f1db30c83ce4acbca6a84b4b5f1e64fd21ce978e6d764277fa7528323dcc566e
SHA5121165139646171a74b04d018bf430fb9c881c87d50f5e325fb5e3d7df983e99b31ec86d3e41e9be2964f2cc621462fc514b7679602f7656c7a6ddfcf58c0f629e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD54a16ffbc0d73fd38fcf5decb3061032b
SHA126989f0032d1f0576c9a7ce7fee24174f61c4b18
SHA256bf3123331d6c0a960f0a7e9520aabced9c015ffbfdb9aeb1fc592670732d272c
SHA5125aff923f1f647993fab4b48c7911b9112907703f51b17c752858f5fd08d914006eae6b2fd370146e5dbf809a1181a8b51cd77ae25fa374187f25918c4fcd5b0f
-
Filesize
10KB
MD5b482a828c2cf7e4b2720b4402bd851b6
SHA139d03d1fbabf41947de934a2f9c865019fcc4fa9
SHA256c0366e602f5c635320660ba155bc4740017606d2fe36e246dd58c3c53ca22cec
SHA5126f4219584781a9e96b48b2fc65bc5b551529eda20ccce06cf676493f74abfb5ecb2bd81a8ff83d1f0896f3c02b8202a0cdeaa0594dde15be36d97b060c432fef