Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
f400445d4a5c09b46d3557d3658aed70_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f400445d4a5c09b46d3557d3658aed70_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f400445d4a5c09b46d3557d3658aed70_JaffaCakes118.html
-
Size
22KB
-
MD5
f400445d4a5c09b46d3557d3658aed70
-
SHA1
55af428d5c89e164aae89a75fee7843f474cafe7
-
SHA256
1e505859374d80a318acd6718007efa4f552f41225479446f5ab284d7699b73a
-
SHA512
37f4f63e73f45652305a0693d8123981a2693a51cef1970aeb130d94f1128f9c1e82f390bdbac73970a15495ae999ed94fdec629f39fa2b583794deab1f74930
-
SSDEEP
384:SQggZvM+DGfkA6y1bIDuBEQgAawe5vpnOV0u83bf2Orof:SQJZvk1bIRQCB5FD22of
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 1808 msedge.exe 1808 msedge.exe 528 identity_helper.exe 528 identity_helper.exe 6128 msedge.exe 6128 msedge.exe 6128 msedge.exe 6128 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1600 1808 msedge.exe 84 PID 1808 wrote to memory of 1600 1808 msedge.exe 84 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 116 1808 msedge.exe 85 PID 1808 wrote to memory of 2616 1808 msedge.exe 86 PID 1808 wrote to memory of 2616 1808 msedge.exe 86 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87 PID 1808 wrote to memory of 4272 1808 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f400445d4a5c09b46d3557d3658aed70_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffd409446f8,0x7ffd40944708,0x7ffd409447182⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3780 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:12⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7028 /prefetch:82⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,11824479843558535272,8188555456267250646,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2368 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e2ece0fcb9f6256efba522462a9a9288
SHA1ccc599f64d30e15833b45c7e52924d4bd2f54acb
SHA2560eff6f3011208a312a1010db0620bb6680fe49d4fa3344930302e950b74ad005
SHA512ead68dd972cfb1eccc194572279ae3e4ac989546bfb9e8d511c6bc178fc12aaebd20b49860d2b70ac1f5d4236b0df1b484a979b926edbe23f281b8139ff1a9ac
-
Filesize
152B
MD5864aa9768ef47143c455b31fd314d660
SHA109d879e0e77698f28b435ed0e7d8e166e28fafa2
SHA2563118d55d1f04ecdd849971d8c49896b5c874bdbea63e5288547b9812c0640e10
SHA51275dce411fce8166c8905ed8da910adb1dd08ab1c9d7cd5431ef905531f2f0374caf73dedd5d238b457ece61273f6c81e632d23eb8409efbb6bf0d01442008488
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD51278e3942004ce42d8e5d61c401e67b1
SHA19316bf1c68fb9c1b9d9592fe124cbef7dfa1f75d
SHA25673c18280371de449729cb39c142fb21b996a3a2a313434c23f28ea65877c208c
SHA512ebf48c7e31dbdeb43cf9409cb528a0a03e5dc475532b3c07eb338eed4dda785060844f8415ca233bb51f6cedc0cd4795ade18bb12aec5ccd5e74077497e1b7c7
-
Filesize
1KB
MD5051b2e53aa86cd0a3fdceb354f9fd196
SHA1e8b21e79d9ea88472206660ffd61f68efd8cc6f1
SHA256872ad2606f064e52ef74a46752725b6c202957e375f182e6822fa2170e28885b
SHA51211a10636a109a2d10a21b3b2f93bb56a0c9d71e3eeb281bfc83e730f43764af301c2e4cc8ff6b4bcc68d304c18489bb4975df05d03be4ab482805180ca79bea3
-
Filesize
6KB
MD5ee8f12cd5d90462b973c54ac339a1783
SHA1ff0c9210a71b109f73b58122070d5ac59e311c56
SHA256005d3e4b3387263798cdf875be61a4be11bf06cdd06b478ef8cfca6ec93a9c1a
SHA512bc48622617ce92f067adb64707427f1fbb4ee4127364e0782a4e93673f74ff25378626789e2b5e70d0c6fe1125e050a2eb8c62821baa8298304bdf696d988ec4
-
Filesize
6KB
MD5bcf1e2731cd69d955c57ce543998022d
SHA160dd9454b18ab89cf460df8ee67eae33c5032334
SHA2564846e9fc228f7c2c7320e43107c610269e1fc083e4111a3147bdf1782599f918
SHA51256d05d8d92dff00d8a9059baa03c7e2ef98014401e939998ace7b402e3a5337c49cb1ce6576b5afb92ea66e512169047e0ceb1e9bbf020727dd3223afa89559b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5de09c20ebafc4ea64c93021d5eb098c9
SHA1fe8e8fa2c256ddb1f936e7811fd90713558c06ea
SHA256ba95280d0c1b30a35ef8aace16e09fffa790e4d948adb2b72e26c29f3ea52a27
SHA5128155388e46b864f7c78935bead7a843e0c63089b6b4c1ad5c1740bbf3b82f2314b50a238f10cedbef310c7a8b728833c981fd8635ef00cf6d8cbffac43d9157b