Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
15baf5961ff9aabc852cfb53c27ef84a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15baf5961ff9aabc852cfb53c27ef84a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
15baf5961ff9aabc852cfb53c27ef84a_JaffaCakes118.html
-
Size
148KB
-
MD5
15baf5961ff9aabc852cfb53c27ef84a
-
SHA1
bb50e26b53827cf93263f3295693f0d3aa622961
-
SHA256
4d59922b4c117b8862bd5b32774e3a216ba0051dd97f137291063dc97133702b
-
SHA512
0c41a571ce8163ecb2346771e97408f33ea40b071c44c516311d3d89ae278687fa3745e9a3d90c88c16bb1941d7fbdfca7267dac4781b79a2aa3319e7092f569
-
SSDEEP
3072:qHRcVhIVs2LQe2U0Dzvj40MZEPjLpUxAfYxslxNcl8CLcXmNRSxrf1Onl+pRkR8p:Cc7J/jXmNRORkR8p
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 2252 identity_helper.exe 2252 identity_helper.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4776 wrote to memory of 1824 4776 msedge.exe 84 PID 4776 wrote to memory of 1824 4776 msedge.exe 84 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 1284 4776 msedge.exe 85 PID 4776 wrote to memory of 2172 4776 msedge.exe 86 PID 4776 wrote to memory of 2172 4776 msedge.exe 86 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87 PID 4776 wrote to memory of 700 4776 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\15baf5961ff9aabc852cfb53c27ef84a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbfd346f8,0x7fffbfd34708,0x7fffbfd347182⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2384 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3940543090373614274,10638528947874906370,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD57e49047fb66bb4b6a78d75c4b5eff913
SHA15eebc97055711c010eb6121d9df8c7dd7fe62879
SHA256f0f19b124eb2086357cd4313caf8d07c2f1fe986a187d72cb94eef5aafd8d5dd
SHA5124450f98b228b98cb8c86c360746487b340a322814703b6c10e49f6bf9a039ff4085e16af6b1bcb1cdbaccc5f18a16a569c7abd61c33e1c7d08a8b7e1bc7c50df
-
Filesize
1KB
MD518943eed72a48acca12f7c5c0e7eb0bd
SHA14703d540d2ea7942469cb1f6a4f1cff707a4dcec
SHA2567920f7fe43e94493e33900c5b0279d47af2a8165f7e6cd0e12f0620c744b5bca
SHA512161e6322895dc7cccfcb02f13a3e569fb6d503fdc209885af4dfb4214f279b7d5aebfe706654d2825afe82703ecd6b43c0da43a5185643cbe39616422839d91e
-
Filesize
7KB
MD587eb6110754b18563db3a2303108257e
SHA1b8403f42059d9e39ca63951820ce1d16bd27cdd7
SHA2564ec9d7e896e0ce004afd7390acdd266c7688fcb2a5407c91cef3beddcb228af9
SHA51292baa13b18712134f4176c5da2a00076aea0859a6d7b5f13352330520d9215bc087cadb22edc47c0867a1a654b602c82771f1d78d36ba7521ff7b6860f30b57d
-
Filesize
5KB
MD530513bd4e01989c549e90675a841f68c
SHA1761ea01af81f59a3db55192b37f99e2274fbd2bf
SHA25615dfd68e610b0bc64c6331d029cf8f3c9b2faca7353b3b73524ca24df30cb6da
SHA51283f187674e2211214a475d0beb2ec7f51528e818068d5d2b9e05fcd6742f873372944bc671e97655266db993de2b0b111746830b57c99b8fe4fc350750f5e56b
-
Filesize
7KB
MD5d056402bd21fcd48e04c340a823fd9f4
SHA1723c6880325baf96d16d09eb4f2f49e674953876
SHA256b5c453166d01ca57f9eef51f982d011b61f057cd3d85ba580d13b8fcf913d7cf
SHA5127b0f9f51248fdc7b8b2e01a7cc6158fe787235efd26a2cad5574a2883f71e99608cc6e495b4358d342598c1dfde3813ed04542bff8ea69839032b18bfbc5441c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55adadcc2bd26e45875def7fe76d043c4
SHA1281f8d55a0e64cca9ddd3197f158f337eded2e84
SHA2568fc926e2fe510a2794712c2648d8ad795f0185c3eac5df7a0d37b260efc4f8d3
SHA512109d22c57396db6ff98f2577cea0f9f5d212df8d8e37ef2f1cbb7234a3527c7598162a02ab621f2fbb42e176fd0858a247efa7fe98ed69501b736144bcaf39ca