Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 09:27
Static task
static1
Behavioral task
behavioral1
Sample
4c42ff207b187cd4ba0dc6ecc5a351cb_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4c42ff207b187cd4ba0dc6ecc5a351cb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4c42ff207b187cd4ba0dc6ecc5a351cb_JaffaCakes118.html
-
Size
110KB
-
MD5
4c42ff207b187cd4ba0dc6ecc5a351cb
-
SHA1
f853bd2531375508ade871ad66b6d117fdf5d004
-
SHA256
b6eda2fc6e73be7e81d6108dd69e23640012a8b8f4370b90cef788749ad56b91
-
SHA512
4a7cc98ff6b3c1b557a429eca59895debcd9de7a348e240f23f56d26909a5b413764104d42efd984c87b2f1447134d01263e695c3e665fca8657477c6002a6a7
-
SSDEEP
3072:2UAcXmNRSN1yyiUt06Rr65Dva6pgOWTgB4LolFp:5XmNRC6Hf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 4868 msedge.exe 4868 msedge.exe 388 identity_helper.exe 388 identity_helper.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 3032 4868 msedge.exe 85 PID 4868 wrote to memory of 3032 4868 msedge.exe 85 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 1848 4868 msedge.exe 86 PID 4868 wrote to memory of 2988 4868 msedge.exe 87 PID 4868 wrote to memory of 2988 4868 msedge.exe 87 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88 PID 4868 wrote to memory of 2388 4868 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4c42ff207b187cd4ba0dc6ecc5a351cb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9970546f8,0x7ff997054708,0x7ff9970547182⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6456 /prefetch:82⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:12⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6292 /prefetch:12⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,18205358668739142886,9939738941113715618,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6240 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
23KB
MD58b41d9e82bfaf51825f94b0bc9facf25
SHA19f988a1b5c14425843d77bccca491b419f115816
SHA256c0396130b9807c0b45615aefc58fd118f64899622a1a15e5ee6a88ae3516704e
SHA5129d1caa1f3fea8e19eb0b8dd6c131665d826bbe85327757f4469b3e41c3c5dc77b5f3ae8bb2360a3979b5607933f7d5f7064abd1f196f7729e4ee90b23571c011
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5b7a9bc82a54f59306a4108f432e27889
SHA1126f17c00fc13472d2f3f4575ff4f6eb44c0afe8
SHA256fdbf44fdea0052bb69afed31ef3861bdc66853601b0ffc1bcef2b430f70a4492
SHA512d7ba36fae63db73cef9c1b136af9bafaf37d29b87a0595b369d8ac14ace4a483f26c012f04735f25e7984ae4a1afe353e5ae49e3f547b991d13309bf5fb71413
-
Filesize
1KB
MD5a971bd7ffdfe9e1c290ba0c0e4265310
SHA11a6f3471e8296526b23ccd5fc30c871e6223c112
SHA256a2710ba97184334f42213d05265d63e1ee96635e4c4158c992682ad1c61d6dda
SHA5121289e8bfa82877e2bec297761499d8c16691aef1851153ff9c4adf0586299f15212c9187fce9ab93fe7676752248f086af967301b1ec67e68283b93db417c45f
-
Filesize
6KB
MD5663de3476dbd8f4690c4aee5279405ac
SHA183bf7764b43f622946758edb15b626854bb51369
SHA256452c18289197a4c390294a0858fb4268294ee23df13d9aed8f01965526a93f9f
SHA512c98138f253de4a8d60e918417379207e6a17957d88ae0d0c6ccd0d6b6f3eef2df84398d29f854f6d98810361002b203002940dd90bf3f29787035819ae21e3fd
-
Filesize
6KB
MD5fb9601d462163dc0348113401c74db4a
SHA1939ebdcac0d26aa5f52d8955b54d3fdf03776431
SHA256a2aef90fb27e2e7c37ca132c3c5ec695f0c8e21eedc1ed8629ce2a882501d995
SHA5121299f22d29ad2e3ce05f38871be7aa5295fc8a741f9d006b921cd4e34b97b6e24e0b21adbf9714a23f866e3624626e9484f1f0a9904a4d5b84cdbd4f9d8f3c10
-
Filesize
6KB
MD5bf3f600ce4a548661bd910b28bfb0767
SHA12b748f4fa761347af0f71e01fdc0d705e28b41b4
SHA256427a7a66cd127aa7f94d3f0932802314e4890affcfefd8fef29a5f33133481d0
SHA512f3f763bb5af5765f1db64f5694b4580fa1ca74e3f9a047614d4d1e09810a6b7dddbbccbc4a92ee04c010793392482f5b1320c6678f98c48b56ef583554a6657d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5bc12357a8fc333704c0519ca93946387
SHA1668d9fb07a97eda89bb77a47bfe5a168ad088fec
SHA256c9634f7de8a12757fa09906c8e98bd63c26863e30f2e2fffb4b1cd32e54a523b
SHA51297f0de6adb582d103fd9fd7d415720f91bd79f20b847d063743975add7efc306fc8c23a387e860e805a561ea47caabd5579d9a447c28a901ee5b596dd0d698bd