Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 21:51
Static task
static1
Behavioral task
behavioral1
Sample
14a0bd76032e3184e5b2bd6c419b0253_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
14a0bd76032e3184e5b2bd6c419b0253_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
14a0bd76032e3184e5b2bd6c419b0253_JaffaCakes118.html
-
Size
77KB
-
MD5
14a0bd76032e3184e5b2bd6c419b0253
-
SHA1
9323d39c713f587fe4c0d8e5f64c8712bc2efa68
-
SHA256
f0b2b2e0bf79b2228444650fb728f47a2703f78bfbbb307f29e176aca9cb4e11
-
SHA512
a7a7abf1847535ee9a3af7771aee5d08a1df5e9b64c8966b78b641b560bea5c7fc9ae6aca3adfc2f7fb0c701ee51c10e7eaf4ed3e3dce4fb24ee95772d7bb988
-
SSDEEP
1536:kCs4545Tyx454ZthZJHqnPAyJsy8tbdyi2Q9SLmvUhV:k3O454ZthZJHqnPwXp20vUhV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2060 msedge.exe 2060 msedge.exe 1664 msedge.exe 1664 msedge.exe 3432 identity_helper.exe 3432 identity_helper.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1552 1664 msedge.exe 85 PID 1664 wrote to memory of 1552 1664 msedge.exe 85 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2360 1664 msedge.exe 86 PID 1664 wrote to memory of 2060 1664 msedge.exe 87 PID 1664 wrote to memory of 2060 1664 msedge.exe 87 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88 PID 1664 wrote to memory of 3256 1664 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\14a0bd76032e3184e5b2bd6c419b0253_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa5fd46f8,0x7ffaa5fd4708,0x7ffaa5fd47182⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,18301869572937758908,328477670905018417,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,18301869572937758908,328477670905018417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,18301869572937758908,328477670905018417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18301869572937758908,328477670905018417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18301869572937758908,328477670905018417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18301869572937758908,328477670905018417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18301869572937758908,328477670905018417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,18301869572937758908,328477670905018417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,18301869572937758908,328477670905018417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18301869572937758908,328477670905018417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18301869572937758908,328477670905018417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18301869572937758908,328477670905018417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,18301869572937758908,328477670905018417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,18301869572937758908,328477670905018417,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5a0fcc67f20137e1a3f856b2e83866fdd
SHA1d78e383163e4e8cb237b2d7b0ecf80b689238ebe
SHA25622e2705378d88851835aaa88621a5767ddd607b4ad046642132ef25397e1fff6
SHA51211ddd87a8d34de5710971b6d72eed484a010711618fc34941f4d2a806b889a3fe60ae4fbff57184c02ff1c883d92b7f5faa1687ec682bb2785abb8574c075921
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD57e0264a502dfbf32f2bea3f7ab8e3b0b
SHA19220c79eab1adb20f7adf30ccecc49c3309bb46e
SHA256ae1ae15bd0444f82ac3eab7ee86c3d91702e24227c7afcf451b2ed7ec163d9f0
SHA5120162159b0b6d8473cb285984aaf0453ccf8c4117242760529dcb4a77c97a31b9f6f8d64c570310c52da1c702c3d6f6d9b62e89673272b21210b61ce27eaef59b
-
Filesize
1KB
MD53bb98029bfd90a259ed9c54fcc2b247a
SHA150b5f94ab5a1bda3c74103193026ea077820ee27
SHA256c1106fea1dd778205b57044f5812d6a109cd5cebe08341edffdc9800929567c9
SHA5126af48cb0355286054946a3b9c654e9a9991921a3bdd112d4a94b90ce66c86634356ee29f413dcce452df64011f58d2778aafdf07031d3bafce311fdd79774385
-
Filesize
1KB
MD594ea4204715ce1f31c81cddabe6c7e2a
SHA109d2a17013b30861bcabb68fbcea4b954dc9357d
SHA25686cbd30555f6e68736f9e19dd6c2e6e9244e3c1c486cc40d59114aa9346d8a91
SHA512b28b42fd2d784e3d5a9073153b7e8313edf55a78a3e67257ace9bc68b95a14ec48cd0919ed4fe925e56297a5c37c4e6cabd1b0d59aac85db5b8e316c8ec1cc94
-
Filesize
5KB
MD5ddc058620f7594581be3e6cb252e804f
SHA143902bedbd136df32b5bfa425a1faf498d0286b8
SHA256289ee01b0c282dc3ee4fdf0d359472689dfc831fb8d7a122af1820b0cb163d4c
SHA5123a150aea6c6d5438d43c798f837c9d21334f74d1b31e5172750afc30973f44f6fe6c6745a5ed1e21960c9388989e6fdd92de24afa37cecf07e7c55768bc6ca74
-
Filesize
7KB
MD5523cd8fc833f2bc44d86127c545edaf7
SHA18813e7e4c867cebedfa4b2cb9a34d8706e8c7b72
SHA256bd905c1fdf72ea2b572336c0bcb9c03ee6f1c044c23cf51b9f5f231f35ed7d0c
SHA5124bc9c166a8011dbb1af1a74faf79f8b9eb9f7d97f547190ca37f87327ceccfed2db36ae5eb09b7d73e74a910aa0be457b3d7c6e69327c7fb22825ecf927f5426
-
Filesize
7KB
MD56ec46fd5272a9b2cdf51939a7793a667
SHA18ba07951f317ed380130c33433826da5fe8c9095
SHA25655245d9b25d69187a4e4e476f7006be3a90d69eedfc76bb9e73ba54811891f40
SHA51259df62975d7ba1ccbd6e1a7cefbfe621b3d977b64c9d33a902aaf4bc0a7bcb106e42192e6dc1e13710e44ab17a5ec9751812e84222a4086013fa33eff87f57a8
-
Filesize
7KB
MD53bc996b039d074525a7fd188c9013179
SHA15e3afdaf332f42b2c19bbf5c1f44583f5470b8e6
SHA2562ca8415feaa2227733fe811f812c771ff0cfe9d7b1d5f51c41a68402b6c6f679
SHA5126ab1201795d7afa40da2211b573fd8bc5d42b2a4d77c468a42ae3e8d698a3bbe966dcf14ac01c3835a69dd213e4934ff9ed0779c152bc7562b0ba7b14d2ca67d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58ecd7e48952a2ebe7bd6d4ff7d79d4ee
SHA197b89517322e0b179645f03b202e6b1ef2f73174
SHA256501871c13b3f080dc014338470e90cec06c17a348b4091b820a4fc14fe48c079
SHA512b0a9cb9eb0f3a12d65eff4fa2d6fcbd36803bc402d85148a319bcbf45f04724d1649816d9551885ba134aa3509774a5b1576dd651ab97205e75d8f686833244e