Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
ff3828cd825d37a367f9975b910c99d5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff3828cd825d37a367f9975b910c99d5_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
ff3828cd825d37a367f9975b910c99d5_JaffaCakes118.html
-
Size
432B
-
MD5
ff3828cd825d37a367f9975b910c99d5
-
SHA1
577bf294a9488a9b88796cf54ee22e7033738a8d
-
SHA256
bde4653c2317d4be2c140af627dcceb1a9cf96bc3016259cfe64ad57a4cbbfc9
-
SHA512
ed52d7a6d664afbd57bd82cac2f8a8cf4043e1a7f0230507f5e8eed0770877dc30786b5805c3df804d3491d01e73e6b27bde61604494266ff8c58c29e0750556
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 1488 msedge.exe 1488 msedge.exe 2468 identity_helper.exe 2468 identity_helper.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1488 wrote to memory of 680 1488 msedge.exe 84 PID 1488 wrote to memory of 680 1488 msedge.exe 84 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 2984 1488 msedge.exe 85 PID 1488 wrote to memory of 3592 1488 msedge.exe 86 PID 1488 wrote to memory of 3592 1488 msedge.exe 86 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87 PID 1488 wrote to memory of 2216 1488 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff3828cd825d37a367f9975b910c99d5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6faf46f8,0x7ffc6faf4708,0x7ffc6faf47182⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2364 /prefetch:22⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4456 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4416 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3304 /prefetch:82⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2352,2979480492921537165,11434325391748286667,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58f38951143ede15b2f00d3352e458d47
SHA11130065985230474657d5f744e99312f22c69485
SHA2563a559763ad1634ef40108700025a909cc76ca8c66d6c77f41a07e2ced4c9ff65
SHA5125376e21235d1b828a0d04e35d26154a1e52db3fe02690fa272ba982da55b88bb0ab7473e6b2031fe8d19798abefec072e22542132b175912b31279cda6f15f57
-
Filesize
152B
MD5b533661b945a612876de1e58ce73d065
SHA1d93286945efeb7f33b49f8e594cdb264884c827e
SHA256e5480b47432d7b0ca972afe477fac49f5fc1e8e82aaeab6401de99045949bd65
SHA512672bc0f694e763a8597eebcce7728716a09515ad17854fae58d1f8df8aefca152eaabfd637bbaf8acae8e7936309809525a9f058a990148964a58c831d96dc4a
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
5KB
MD559aaa31958a458dc8851a410fc55f9fe
SHA149cd2b4578cfd2d8431aaf6984102a584bc5cb7d
SHA256e071cce2d00bae61cf352b7e70f44842dc01b57241f4fdbd0219a96d17c72fca
SHA512d092348fcadc46409cae2108cf5b328254ceef790024d81813ede8a93f84fac36692096dcc0c10f91d7ebff8f227d8611cf16ec64fcba0d764c037304c06bafc
-
Filesize
6KB
MD58943fdee6b7a7b10b1fee8b71ab8089c
SHA1969e83311622c97628e067f461d26b60dbf16906
SHA2563afab5f5e5d08a4cd24ac683882e7ff93a8063807e09af77173dacddcd71ad81
SHA512e077c0a2c2c1fa38fb22b78ebf76c55973401ca7eb2f74311d79479ce06044b54f6b5b6da2df76e9ceb7dca7909102ec3dc6821396dc02fad05e83c11a724192
-
Filesize
24KB
MD5eba8517f3652641367e901d3a54f7581
SHA1fea9f4fd8d38fa53f21cebbc148d48fb07fe13c6
SHA2562d7c268095e786a3e6c729a4503a10709df851a8899197637e6d42aa11fce388
SHA512da857ea24ab0a1f4e1eae0a23c1b50e86c5e4c5781f9cff94eaa20127671ed5b1ed681c9b626366f155ec89e767ca11554a77f0f4c3a42c44cf821654b483517
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5a4b50b8884e3b74532185ca3fca332b5
SHA1efabbfb922c17cec54ffbd38f585292490dcf177
SHA256aeaf06772cc8f2e6295957d77e6bc8495dafdb30cf97005016e95eae703e5650
SHA512415283f0e42de445d8dbbe32fdb7de258ad6f26e72583ddf14e8df70f6a0145a24bfed21986c2c7fa16124d57f31188f6755eb59e51e0992a2c6bb2f51d0810b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe589a37.TMP
Filesize48B
MD509a64ada1f8c4a819a909a91d768cb06
SHA173746fbd87facc0502cd5c54eef0b349e617a91d
SHA2563165de40f1f5c7c753085e5ce5f171a6a8481131b64d9425454515b4d6a5b50a
SHA51231027b274c480929127f21724300ca44535452b37e682b19f107937703999ef9d883f276f5e1395d03b35cced8e15ecdf1f72232ecd5f2be0cc79bc1a9d59c6d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD582ab1a888ff575b9c5a93c76e9a17423
SHA1f0c539b38bae4067d12c27eb1fd66ee52628567f
SHA256daab818464379f561215936d3d079f52be25550a308fcfb902af53792149a5f1
SHA512c833b520ac53e4aae4c7d42c217f36fa14ef9980af713fce04fcc16543b5b603effe6752d45ce01630fe4aa50255d4b881fd437c087e7f85f54d26c7b3387446
-
Filesize
11KB
MD593a8c354567b5bd3ac306c9ecba3008c
SHA12109060d83dd46f8e24c95ab4aa1065d54bae401
SHA2560df16558bf5b12d35642f5ccee466f838054e85e64c421bea1c5bace7e2ca578
SHA512819725a14d5b2799e2db837b389082005a9d1d1f0333859bbec2ace4351a9e387c77d3e2ae820bb8bb6bdd23708e0a59b08fec208cab4bf8e8062da52afe168d