Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 13:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1e164f7677608cf2b7e02cd278d32910.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1e164f7677608cf2b7e02cd278d32910.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1e164f7677608cf2b7e02cd278d32910.html
-
Size
126KB
-
MD5
1e164f7677608cf2b7e02cd278d32910
-
SHA1
1a7c4b65abf5ade78bdebdc3e90d4e5d7294f697
-
SHA256
26c91c3a87677f6dfae28a4cabb40de0e6b8d629c012940e27487009dbf9ed9e
-
SHA512
38d7679530ebdc3d2878fb1dcbad30bbaca61108cb8ac70664b3550ecf8c9d506877cc4308a28c55150712518b021b967f638cce597eccf01160090115688590
-
SSDEEP
3072:pUMCWDxYxQ2PDxYxC2T/Z1sQoEZN8lcBSefhENE/jzCqezq53+O:pUM1DxYxQ2PDxYxC2T/Zwup
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 3780 msedge.exe 3780 msedge.exe 6036 identity_helper.exe 6036 identity_helper.exe 5768 msedge.exe 5768 msedge.exe 5768 msedge.exe 5768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3780 wrote to memory of 740 3780 msedge.exe 85 PID 3780 wrote to memory of 740 3780 msedge.exe 85 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2368 3780 msedge.exe 86 PID 3780 wrote to memory of 2896 3780 msedge.exe 87 PID 3780 wrote to memory of 2896 3780 msedge.exe 87 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88 PID 3780 wrote to memory of 2180 3780 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e164f7677608cf2b7e02cd278d32910.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa98a646f8,0x7ffa98a64708,0x7ffa98a647182⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13064 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13036 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3400 /prefetch:82⤵PID:5468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2872 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6376 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3312786377923438852,15167685503774165198,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5fe34818e84c2ecd791d5688626430808
SHA17835600f930b13371a6e207235c73fd9c2557879
SHA2567c58138d353bf8be624af93d121b6c36248c52832241ff1ceca54b31b5c422de
SHA512f9686a362200e20596fb78f412a0f286fa5cddb96bb6cef7b73c4df784eaec1668222ed481d8e1070422ebc506349f1953e48cf20a04429c08ed86f182bca31c
-
Filesize
1KB
MD51fd781492eb3d0e3d33733bc3e7be269
SHA15e4faece5050ec71f591c197c98fe67cd61df0fd
SHA2564f6538da92a40644a72f3428540b44c033f0df978723376410425ef69b7faea7
SHA512fbc28745f50fc4825257481214345961c1cb8791b585c6c1f4fe99b48a9563c23b3ddbce3e2a061c960fee4a7eb347de879d4c2e888048125e86a3aa7054b6ce
-
Filesize
5KB
MD5d257cb6634e22ec7ddc09a43d4ef3cfc
SHA1590be50b838bd3909a30bacd744d777369c0afd9
SHA256abb145555f597c2a835d21aa67e2e4bb7eeb30ae4a581df49a2a35ec8b71108c
SHA5123e0c8a4ccb20a009242dafaac00d5f91e37c063612abf9e52132de2d80cff32b4ad79b2c11e4b7d01259f08cb0117282b9ddee0fe8a4a36d4c0f9bc41fde5401
-
Filesize
7KB
MD583b96266a89b77900170e79672140769
SHA109c264b7aa491594876863c8c1d44e04327621f6
SHA2569749a14e0ad75a687ee6221bd1fcfe831c84e998059e8f4c748a3a1e9490f61d
SHA512b71881e8164e72a7ff34c879d6c537f8a1f77e5ac27efda04783b82b28c4f9c4c83d4219275ac6c141f22405150cbde84841c6e057415d3b3c7e450242f502f8
-
Filesize
203B
MD5caab6d4a0ec85fd2ea8b81c4f7a62c2b
SHA173c71329c2f07bcd2a6ec0341ab579581e4f3fb8
SHA25649762dcca7b1ad9f20dba21faaaee4fdd2859bca7ee2dd6cf868460c47d85eb2
SHA51260deddc5e6569f0999c2a0b2de00a27cc6fe9bd1282c7d8caa6d039e9b7e88269b62ad667d4d9968a0347ac687bb4e2cf9abb4cea517c2b07a48d17703c833e9
-
Filesize
203B
MD55b4a5026df2a3a091eef33eded09e0bb
SHA132c2b9f149da86f73d7df21a59abe136247def4b
SHA2567cd758e5d35b3cc862616cc83514e45a99ae86c07119a76532c744f764a80cd2
SHA5122373faca05925001f5dd51ee9cabb564836d4c70bfc3007d406b030a4468e26e8400e5b0cf77614a9a058ec123d38a8bb03c0403cbb80cc8b21c660d61b2cd41
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD596e7934435e02d7e73f46b829c3fc96e
SHA107c9a60b162229037c754cd6a2e8768bb8460e2b
SHA2564d5afd4b5ad85371d5e4f4110434371ff9e90ff1f0c21489e373c205b7682b97
SHA5121753d731eb73a2e28f57695664e15b81e13f22e6eceb29c7e53d4b0a7d6eefb74a05526a47378557409eed7503a6f67a7cd97585e9e29176ff8261a498ad257b