Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
f00c3005d2ba2aa2bb106df4c82d57c0_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f00c3005d2ba2aa2bb106df4c82d57c0_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f00c3005d2ba2aa2bb106df4c82d57c0_JaffaCakes118.html
-
Size
895B
-
MD5
f00c3005d2ba2aa2bb106df4c82d57c0
-
SHA1
dda5a79c27d8f2271c5839fd9b2a36d3c0bcc8a7
-
SHA256
28f6a1ad7d864e99fe01173778ba6e19111fd95957a2937eac45d3f060d94352
-
SHA512
791bc74d4032753cb3acc8fa2aa727096cefe9cb833d554c34091ed900943697cea7e6de134c8371edd85dbba86ec70f499eb219e2e4a9a53282b1161704f840
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 1704 msedge.exe 1704 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 4736 1704 msedge.exe 85 PID 1704 wrote to memory of 4736 1704 msedge.exe 85 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 3648 1704 msedge.exe 86 PID 1704 wrote to memory of 4836 1704 msedge.exe 87 PID 1704 wrote to memory of 4836 1704 msedge.exe 87 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88 PID 1704 wrote to memory of 5092 1704 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f00c3005d2ba2aa2bb106df4c82d57c0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff59d946f8,0x7fff59d94708,0x7fff59d947182⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:82⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:82⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3600 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2044 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,11014804838522722583,12995557615740758357,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a9519bc058003dbea34765176083739e
SHA1ef49b8790219eaddbdacb7fc97d3d05433b8575c
SHA256e034683bc434a09f5d0293cb786e6a3943b902614f9211d42bed47759164d38b
SHA512a1b67ccf313173c560ead25671c64de65e3e2599251926e33ce8399fde682fce5cb20f36ee330fcd8bb8f7a9c00ef432da56c9b02dfd7d3f02865f390c342b53
-
Filesize
152B
MD5cb138796dbfb37877fcae3430bb1e2a7
SHA182bb82178c07530e42eca6caf3178d66527558bc
SHA25650c55ba7baeebe1fa4573118edbca59010d659ea42761148618fb3af8a1c9bdd
SHA512287471cccbe33e08015d6fc35e0bcdca0ec79bebc3a58f6a340b7747b5b2257b33651574bc83ed529aef2ba94be6e68968e59d2a8ef5f733dce9df6404ad7cc5
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
6KB
MD5a66921b73870345d4df461ce88a59cad
SHA122fd2295ada78055e485519455a0b3abbedf6f47
SHA25695b97c1963a90aec9a19e3d52b2f1ba1557c1ba9b310c3602fb95d2bf07c68c2
SHA51237e0bb3b692778aaa786141998a3699f16f1dd9d64177c6d54e40ae611ef62122978052fa4c1c7bfacd8391e7eba9ee873a31f3d5f9100103fc4a831c20e64e9
-
Filesize
7KB
MD568131b1679fe91263d4f45c6b1370527
SHA11f9de14ceaabd545468f2b015d393473c09fec57
SHA256ac9a81152ee051a763c15fbad32f6229d402e09c22b05504885fe8c9565c5173
SHA512aee766bfa978ab4f3690d8ced33d7a01eb630709086bbc470d7950f755f1a648ac4c8a705fde85b296ee39d9a2b21dd0b5313758d2f8928dbf824129a301220d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD54aa51d7604a73bf2f706476e2de8ed36
SHA18f24b67821d0b3aa27b5ca9e5692730fe5210a4c
SHA2564c90aa44720759ab6b2453a3a8b0b6f6d62b0d353ea5206c08f2977b70925d6d
SHA51291ba573e0f7f31caef9644a1715bb2ffb480b908daa8eebe8acde184565c8f9c8c81570346fda3c04a65c4239bf6d9ffefea24fef078e485d20bfe98e821ea48
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57806b.TMP
Filesize48B
MD5371a5b8dd51e9f80c4953999767be9d9
SHA1f927bfc1d985b84a33c2ac5a9e7108784bcb7416
SHA256b52e2a06c2596c180a51ac21f93f6bf8f98bb5c4186437ee9acff2c104b35cda
SHA5121a3dd66ade26ddf3e9947c1991a6447e487fc313687882cb92e86a74cbe8b9b5b54be245c9e2d3f5f2edf8535fbd5cb17270aa7b67442d1642a144252e80b023
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fa048041e089c30a65a7033dd785cc91
SHA10f86a26db728bbfe76e19fb44ebc1598d3a35abf
SHA256e95a74b2b532eaf7f5183906d75c2f61b711dd21e56a9df11fc3263d2f59a0dc
SHA51250df28786afae17917ed9fbe190aeb9449e4f41eae7e40494b4b918ba3613453ad989130ead3ee835f02449dac06d385fa0bbd7ae2033642a0a39722619c304f
-
Filesize
11KB
MD5b23093c76764cef7beacb434e31e03b2
SHA10440c6ee5eb03bc9498a7455551b78a1c1f7930e
SHA256965be364f7aed8544cbad6aa9c6fbb7b8ce055f2d0fe601953782e990758d27d
SHA512ff0e0063240e65d28d6052a4b5625b62bd2cca8a137c4fdd79738096b0e969cee592f67f44359156220fb00440e19700ab4483c3abe163ff5079c8895488d598