Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
f93fe026ca4021e7f1e4e66d600421ab_JaffaCakes118.html
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f93fe026ca4021e7f1e4e66d600421ab_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f93fe026ca4021e7f1e4e66d600421ab_JaffaCakes118.html
-
Size
432B
-
MD5
f93fe026ca4021e7f1e4e66d600421ab
-
SHA1
d25a106205445e9a8e264507363209c0f4737440
-
SHA256
53245940d1730c66ed91c051f2f8eb6e9ac66095f632ffe179646a7582e88106
-
SHA512
7c07dfd4d996d2c5438ae36c7f7a59fb4b02a3a41559b927faac43b99eba9b65d26d702c576f7e75d099323a47289d55ca8ba67f4020db6ce9f4f6841567d37a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 3852 msedge.exe 3852 msedge.exe 4500 identity_helper.exe 4500 identity_helper.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3852 wrote to memory of 1852 3852 msedge.exe 85 PID 3852 wrote to memory of 1852 3852 msedge.exe 85 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4532 3852 msedge.exe 86 PID 3852 wrote to memory of 4920 3852 msedge.exe 87 PID 3852 wrote to memory of 4920 3852 msedge.exe 87 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88 PID 3852 wrote to memory of 1928 3852 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f93fe026ca4021e7f1e4e66d600421ab_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff74546f8,0x7ffff7454708,0x7ffff74547182⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7157375807416485171,14867896427691329081,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b1931878d6b8b22142fd7fd614add5c
SHA10e20ec0bec5a9fe3b6666c3009626f0420415bc7
SHA256d78e49cf9c940d8a407fca2338e30b754e4579c64e88932c46c3871f62c15904
SHA5121e7a63ff7340719736560277601ff43f30937dbd4a1fbacbcb0d72fa708216692a4bb4ba658edf227b767975b430fc94e7c4f0b5dab29bef9483bfcfb38e1cf3
-
Filesize
152B
MD570ae4bf8f75c69610c1d00131c1ec28c
SHA1eab92c184a3b655377f375b1b25ef85fb06c7130
SHA2569f46453862eb083e85697631455185c0ead19ec86c1ae3d15274c06c9a38731b
SHA51229299dbc0114f01525bff67ec421a28056905e8f5d21f00502554f446883b6086f8b9a2c27a591f364077da17c21438910b8dbf163a59f6f80272eb7d5f05c68
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
7KB
MD57f1062a6e73bcc28dc48853e53172855
SHA1471565d0dc738ebde103ef45d262c709e031c5a0
SHA25658739b94c10d44c738afbe4426f80729d5a2403d0195c03bc3db9f1e279655d4
SHA512e5de269d80504fcebcd50fcdb1ecd14a6c77f47578d87949359b8e9919917886d9dc93aa895cacd189bdb3b11f79240d13f5c10a61a93556d7fc7ffaf3ef675e
-
Filesize
6KB
MD5af2146e0927da62ee03bfe097a6dcddc
SHA1d8909b8379a78392634e277bcf7024c04b4900a3
SHA2569a0eb514d685aae8b4ac4399bcfcf57db8d402dc73c5dd743f8f7828f5b622a9
SHA512db2006e0ff884c1cbc2dfed743ccb034bed0a5eb023e68977c886a0f59bdd846d52a599494ca2c6833f32a704637237e33508955063d778eb833f26e1f605238
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD54ab3309c96ef007c158ad0f071760801
SHA1d6559014c98c52fe9847631f4a998f0245da7c3d
SHA256669a3e77d2792f64375bfd7eed53a066e5b0d3931ca4e8fd897c65c5c5dab639
SHA512db488374af2963f1299c1500cc5376f25d113b14c96753a2ad6a8ee16de5bcaf48e0b1eaaed51566935d459b1f26edd9eba90bc330d42b272f6f70c5fe786152
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57b97c.TMP
Filesize48B
MD5bade686465760251de4b3c3844dff6b8
SHA17f5a4f304ead60cfbd9b69a31b8ed014fecac215
SHA256f53ba3cb6b0594f93ff3d9b77037e2f65f1ba52ca2246e1a9b3a9918a6be2964
SHA5122a3cbc52d4e408b0d9f4ec5f2ba6f9a4b25158a2cc10019dbe356b7ed5928534ff17ed2abad23a8273a45eee903687139085f4e5265baf03dd507340daed4348
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5bf27285233bca3f296690732c54582c4
SHA1fb1fbcdaef03512ce4e1a5ba4f2f4851d0ec951a
SHA256d504edb92c1a0993ac79204b017e804b68f91eae2b168490281687adc53185a4
SHA5129363707fdeb163401c2adac9f659923ab506e8d2f80698d9aaefc2501a6941e73efdc75b6854345914f368c62e9061a07fd4365ae0cf6142026799ee02cd8628
-
Filesize
11KB
MD530b6946f3e69630d3baf9faa3888c6a3
SHA1b377ab570cbce54e763a36c3b521046b867995a8
SHA2563caa07fb17f81e6725ae290825f4457bb123952eb39aaff31577a4cff190fe97
SHA512809fb1006f7f8426d0ba8f04033a49a9bebcd7639a823231a72b2c04d2a6248ce5061640237dc3434605a16fefbc15f38528d83d09c74db7247dc71d74cd4b4e