Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 17:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2dd5b7d39208dc026ac5acbaa90458b6.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2dd5b7d39208dc026ac5acbaa90458b6.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2dd5b7d39208dc026ac5acbaa90458b6.html
-
Size
302KB
-
MD5
2dd5b7d39208dc026ac5acbaa90458b6
-
SHA1
a12e85a7d609a5172cc45f2379a5e86e8feb51c2
-
SHA256
a9a0856231e36c30505b48f91fef6cc1d88802cd8446820b005fae55a5e7d933
-
SHA512
f7da108451f08b01cda8e402151cd8fd4f99d9e1bee86dd1aff0e5be41900ad631ed8158a9e4fe3229b9d07c0ecddd9552bd221fc0d3eaba1a4de0b7d0084011
-
SSDEEP
3072:n8qO6u2A5D8bMePdrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ4b7BtEOU:nW6unD8Hhz9VxLY7iAVLTBQJl4JU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3800 msedge.exe 3800 msedge.exe 4252 identity_helper.exe 4252 identity_helper.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3800 wrote to memory of 4144 3800 msedge.exe 81 PID 3800 wrote to memory of 4144 3800 msedge.exe 81 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 2180 3800 msedge.exe 82 PID 3800 wrote to memory of 3432 3800 msedge.exe 83 PID 3800 wrote to memory of 3432 3800 msedge.exe 83 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84 PID 3800 wrote to memory of 4848 3800 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2dd5b7d39208dc026ac5acbaa90458b6.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc86bc46f8,0x7ffc86bc4708,0x7ffc86bc47182⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4883771105072529309,812563824194172099,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,4883771105072529309,812563824194172099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,4883771105072529309,812563824194172099,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4883771105072529309,812563824194172099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4883771105072529309,812563824194172099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4883771105072529309,812563824194172099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4883771105072529309,812563824194172099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:82⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4883771105072529309,812563824194172099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4883771105072529309,812563824194172099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4883771105072529309,812563824194172099,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4883771105072529309,812563824194172099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4883771105072529309,812563824194172099,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4883771105072529309,812563824194172099,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
20KB
MD52ebfdbd309ee762211b4a2ac39708c4d
SHA1b002922c672dbe1dd4caa02af24d0b1e7da616af
SHA25654ae97d445b166859fe3ba6241b97abbac0aa0d158c72352b774d60ba3e81797
SHA512d1687b7a6da07a72963c96a1e85661046d3d3c96f88445302afa09721fbe211a5fb8881ff14b346b0ebe8a20f5ced21979e9f58e256427e57b85d565bef17720
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD56f5dfe3aa98a68289ac13273290cc654
SHA17e3057eaaeb3d71dca2e0c7763a5008e0ad085ae
SHA256431f736ad6a0606456bcfa30c7a8bb6ce6247e6321a94c0c045065eb76c0f80b
SHA512d3351a0e09a1df65b52cd930408c5bcc85f90a37e7a01b6cf33a8212e5ef19ccd0ae84fa8bb6d2a37571e2ad2dac1f6b480c567a6a8cc7baa96cefa697aa2ec8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD55ebe2f73c21f8936b46d229731e730e3
SHA1db4c9b392e9c8a8bc4e0936c69d623a5c4b55811
SHA256a35d63db756f2c95a5a52d61498451f2f2c33fe13785a6f880323a4d5aa95aeb
SHA5120af071d6895113713f9920451f8bf35276dc7eff2df3b69dfabe930f899057ff60a5f7c22171c5fc2f89d2ceb3619468688724392541dbe811e2bcba9ecc2e98
-
Filesize
986B
MD5b686d5a412e4452974bc77dd4a499f67
SHA1d77e7dd6b0509a922e94f20a60b7f1bf29926762
SHA256334cbdf238c0aef79630de4ca61eb3e2b9e9a73bec202bfc6e5c2a47ade85fba
SHA512c161cb9f211e730fac262d9bdad1dc46a42491dc426264f5a16224c0e935ab197e88f2a216e1175a4f94764d669928ec2d03cc878094a495e619841ca9c51ae8
-
Filesize
6KB
MD500711ac30583ae763d14b5ac93ad510a
SHA197a0878f3005210c497e3233db445d52992e5766
SHA2569222528b73e5e89d1a9cfc074c7b7ae57ab6fd0fb5d9ee57119572d57d198fc9
SHA5128b4b5fef131461442415fa5c3cd8620c7b3d0d5a2ae9a37213ee7a72735e402aa6697295d6f03650c023466579b3eeee12f49144f607290eb2401b7ed67b994d
-
Filesize
6KB
MD5e3bbadd9dc810ce0ae170ad59291ef66
SHA10f55ac7eb53df03622cfe4aadf7677772d9b2656
SHA256d4f8ad778cce0fbb0a127cbda589555119efb880508297cb2d8935f70f32fa2e
SHA512ac03a1f9982c8ede6b81741f40b691e62400d72d2a93bd0ec7458db524bdec010eaac0b81f23671aac16b55ca4a0a4a1e59e1b23a70a20a6118da816c0fb5c7b
-
Filesize
5KB
MD59a8eda95810cceca0789cfe014b715fe
SHA16570fd1cb3cdfc29787be62da2fecf1652d191d1
SHA2560a440df7ecd41f2b86eaef3cd617b142eca91ab8d4386490e5121173c71818d9
SHA51253ec8207eda7e0b09e19f73379091ea44c51db9a7c30470df65c2d1225e62f1a24b1ed019a989f1812ce613ae9162a8eb84ca6b480abb2697fd84d7c53911bf5
-
Filesize
6KB
MD55f3b9912680169b1f57b20ba515144df
SHA17fcd694f4b02f091c86fe6923add9a0a0adbddb4
SHA256a01e58e2af54487bbdc2314e98ccebbc7fb6160e32b0f0a8e96adf6c48a30028
SHA51278b7ce846a4babe3d5daf025e80d3d26b518b164f53048c9a831976e1cae30187b4e78a9d33af5385fb8bbbb3e3f05603a175d724b958eab9a67e9c0cc6a7dbb
-
Filesize
6KB
MD52fe14d590626cce106a7239c4a8fb3a5
SHA178754c20207158d7feb8e470f8413471a884780e
SHA2562d8f2f5269f45d45ba40f6915f4ea53e051f7fe89889a1b3e6a16392c0a41ae2
SHA512beb77c7f1ac885e01ed753224bcdf4868114e2fd01ca3cf7945e85a3449d86731ea4f53c6de54edd227589ef1bf1c678b9946b0e69b912f3e144ff4e82f3516f
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD51e9ab0ba54244131e61738f8a95afee8
SHA11a38e54a3e2011a171f819518a501eea4ffffc5a
SHA2560167876b336b8a541d35b3feab39b92f85c28c7273e167b940a2e7c5eeb42a68
SHA512e4d1b1548e169ab07edfba53bbb03ba6cbb4bc340e91fc5f48cbeec626aa01d13e6aa847a36cc29bc2a2831280adf8761c3c6b7261ed217917f1a634643a00dc