Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
14d6c7eb89dff70f30563e127db68309_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14d6c7eb89dff70f30563e127db68309_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
14d6c7eb89dff70f30563e127db68309_JaffaCakes118.html
-
Size
53KB
-
MD5
14d6c7eb89dff70f30563e127db68309
-
SHA1
cd198386028cd99d3f3f74bb646228ada5f8a410
-
SHA256
bdca13ba1070c7b2a894b760cdeef1d3b6582dd6d4533699d405b3fbdfa29077
-
SHA512
40208a970d451c1a81e8a3667530a95972f3b0b300e286fb7928641ecb700dca75c7f60587e14b62c44fc4ef073e54d34304cc193a5b7b4de02a1058d4e0ecfa
-
SSDEEP
768:ABsWPChxgGRYUSo50zKn25oOTTXrJ+36uxNiTy29bH:F3XYC/coOTvJciT/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 1860 msedge.exe 1860 msedge.exe 4976 identity_helper.exe 4976 identity_helper.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1860 wrote to memory of 1832 1860 msedge.exe 83 PID 1860 wrote to memory of 1832 1860 msedge.exe 83 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 2564 1860 msedge.exe 84 PID 1860 wrote to memory of 4432 1860 msedge.exe 85 PID 1860 wrote to memory of 4432 1860 msedge.exe 85 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86 PID 1860 wrote to memory of 3092 1860 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\14d6c7eb89dff70f30563e127db68309_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb1f3c46f8,0x7ffb1f3c4708,0x7ffb1f3c47182⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2968 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6228 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,4680747459347438246,3142831230504271431,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5e7fd6e69cc34c887cff36d6bd1f85a8f
SHA179b0b106592d2966f22789ad719c498495980338
SHA25624ac2c4f3fa1bec5fea1bd2b08ffede2ce670b6362fb2a3a5968097233ab18c9
SHA5126b569c4d35a32a0c4a4986b43df14e69ed71be7d0c5ea4190274e7e3c4c4fb87e7e8ac62f9f9e46d95a3f948f69128744489bf8162c1121fbfcd6458fbe94d8f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD52d2fec44ff4f4c7315653c46ef412002
SHA1d632573e006b5dce4f8257bb0d5b1e1a87bee407
SHA25657987873ae5951405f61bb71afe154e7837b23f8ab102d23c1b17a35851c564f
SHA5121703f0b5969cd7d9f164d011b4ff4f17df0ce02ffd31f45656986d2c877ea647572a53bdc7479908a4e2893dee9f7938f4dd0dd7167618b01c268272ae417534
-
Filesize
1KB
MD5fb07bb6fc271a4d626f65f9432969ba5
SHA1a8f35c6ddc63d5764e7aa23ee44ebb376decb5ac
SHA2566d4c3b8177390677f0e47432b786c05ce06ef6fa45f8d822b2f480cc5e6d8b21
SHA512da26e84e1162f1959616962b3ae32970bdf2a605c685e8bc82afc2608f2a89bd77f7433269385345d31ceb81c20764288b7244d3970347d32ece347e8b03e2ac
-
Filesize
6KB
MD52415c05a63ed25b8a90a37cc08311722
SHA1b21272cdd45c8aed6014ee33474609a40d7c488d
SHA25631f0d3ba545e5c1100f2965c3d7fd29ca490f0e908d776cf35f87850c5fa032e
SHA512450a2b291a564c656ca515c6e96bba81bd2ab43cd628956f6313afee3cff065ddca5c28d9f3b1c736405cfce580fd3a62769122159c6af557c5576755b233e29
-
Filesize
7KB
MD5ef06a520f4c4dad7c9cda95537517e60
SHA17143d508153c0cf5d171e2c6e608ce19c74532c8
SHA2560fcc17ae9a64688f26a1dee8a747b452efde2dce0d55e8f1cb79be6ed638f0b6
SHA5127c920ef74bb2bd7d5e6cc106e65074a58a4ec373d70ceaf7705d3b574ac21b05426a2e7d78794e650dd6a54677b2549c100f5736263b910d5126b36ff8a78e40
-
Filesize
7KB
MD5afc516039ddbe688897491329a844d87
SHA15112fe300cbc65008f232df83ae1d9106bd0908f
SHA256994c0e7f9d7b39db6f6ec4f84d77ed296eb409a9c5b8da4283fd5f748a152bc1
SHA512b804fc6aa14be4643a990eba2f5dec4e5f218e3daa57543a49c4e7b5d3f3d8ccfe62e7b1dab7f1401399e42d3f192b8d42e1f38279a004e5cd210321824ecd7a
-
Filesize
7KB
MD5d7db54fccb20ad969327c21f454ca2a7
SHA167d03f0426b718ec5c81f815cda69f1e3954073f
SHA256809214355d6e7ac11b2773263c6e8ea9dabd8c10334ccc72b2bf14cbe6156bb9
SHA5124928eea9e70a4826b77288fc19efe0f72cc7202c3686cc3ef24d59018fadc61752ee2b1332e6d428e8583a0c4f3709420cfe9e8f964c95c4df9849a607035425
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53b4a520d50ca6e5c0bc54104c4cf2e4f
SHA16401853333a657144d65335493302309f08eee48
SHA25691242607f25f2db8926c32de9f2dde39af308600ef5c71cfa88c07ab7f124c9e
SHA5120545753b277c9f86ca206730d7422a0d0f285da658844c1ee638931dd31c41cafea90d53108912f804213cc645b99ffc8ad3cf3979c1b70f912ab588a0239fbc