Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
172b9cbab8009c86c7cfb396a18dadf5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
172b9cbab8009c86c7cfb396a18dadf5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
172b9cbab8009c86c7cfb396a18dadf5_JaffaCakes118.html
-
Size
53KB
-
MD5
172b9cbab8009c86c7cfb396a18dadf5
-
SHA1
a9da407f3c253c6da02fd85200790c29b6a2cf84
-
SHA256
e3a1ea15e5170f15487649cbc10329a3251a07eeef2502aba785bc005607149d
-
SHA512
25ac7d0dd67b9c1cf6aa37a7d010069aeb889789e18b9174fda080b335d15e87ede6e43c0cec69760699a3f99cb8a5eaef099e7009b5f0bf9e445c950c10e17f
-
SSDEEP
384:jbCD6GicoGFDPmekxYBvn8oXAu2IChSGH6WBlsOKIshdGbWe+qXqWjNZckpBpdPY:HOI/eqFUvn8ZRsPqXDKOI7o//tzG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3280 msedge.exe 3280 msedge.exe 4080 msedge.exe 4080 msedge.exe 4288 identity_helper.exe 4288 identity_helper.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4080 wrote to memory of 3532 4080 msedge.exe 85 PID 4080 wrote to memory of 3532 4080 msedge.exe 85 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 86 PID 4080 wrote to memory of 3280 4080 msedge.exe 87 PID 4080 wrote to memory of 3280 4080 msedge.exe 87 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88 PID 4080 wrote to memory of 5048 4080 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\172b9cbab8009c86c7cfb396a18dadf5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd329346f8,0x7ffd32934708,0x7ffd329347182⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6388 /prefetch:82⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10176995628713861245,9121807974165451973,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD52daf17a45fd22d72b8425830d68646d3
SHA17ddb17f6af411eea3e686090a0e6f85922e29e0c
SHA2567f482083d425d9fdc00d737d34dc254940f87b8a93662ad606e9e6c696facd5d
SHA512e43214d92c9adbfa57aa78918802874f4ceaf3a43324d34275743471267cf6db8123f1cbb65f32c5e12c31a94f6b7494a4b91bf7afa39b47d315e9343673cd00
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5daa3d7b565bff93e08f3c6f88bd266c5
SHA17d137d68a2af1a89b08bcf0741faaa7883925ec7
SHA256e61e36fd6a9061732d06225fd9347fca760fa0baefde27514998aaa1289bdbcf
SHA512b23c4a64fa20c60d0e9a2d98281a10ead6ba0ed33d2d28a2bfd5d5bfb0f83d4f7483bdf1cffe3f84674f78b99be9eaa82525c0954d818a88e61b09efd5606e8a
-
Filesize
795B
MD506d762c98d2bd614b6635dac6ea9a4f7
SHA161c29a9d4cb4b1b0cd7fa8528405efe819623ea8
SHA256f3b30c24d52e69b120b1103ef234d845e90066fa7be63b0bb730d697d34461e8
SHA512548d4e80a5a20278ffa82d737034f710b6d59d4c06edcf5b95bc9ad2cf499270741d188843b29c9f19f1d86607e1550156556e310d2db76126e3dcfa8fe4497d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD528c81998aaeb59e4ebfe2b7ca3c2bca8
SHA166928af11f6ea27f830e2cc15be1d38ad4db6c30
SHA256ebc2e52b07b8f27ff58dfaf52f0568ca1bf28927b1e82c15af6dba45cf186784
SHA512b96230896c6c33d3413d481433dcf8806b7770ada39716dc97592eabb43580e208ff057dad8aeba57a51eba5449308566e3f2bcd4acbf888d632d63a79890821
-
Filesize
7KB
MD5c4c17541731e6f6c7d2f9408faf25c30
SHA1c2d367352ad55aeb12c0a1d92e01ffd15190b54b
SHA256f5d61ca32f6a9a0e4a93ccf2275f2d56f6358827c40601ea241bebe3b099b329
SHA5120a57929f2382e900e31ebf0225fa0deb7d919f00bc6fbccf3000afe94fb85e4362ce62744a2a2d48e09247a920942c50a1dff9965af8a2de61b2f860c16b253f
-
Filesize
6KB
MD50110f89ecdf1f77b734921eaed5f9cc8
SHA1b3ef1076e44534d5aecdec83c7165eb24622e106
SHA25609fd6bb73ee4e53c65c507af54ae17c7419c626529fdabfc4b4b6dc8cd4b6310
SHA512e4772a7babe665b993d431d6bea2112e6c5522bfefeeea8dd0a829499e17dc8c0cb08139b139d7ab4251cece33ad266989a875d57d1da28adba21f3f16797952
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bc894c1c04a7d15f12f4eac9ce8b2776
SHA1aee624255f28b76eb48154351df01ac37a71a044
SHA256c6cf3dc45da77b700bc6e6865f99f366a0c38828477869e304794332e3494833
SHA5129bab08439361cacedc36cce8a2b6d1e5f56eb674b4b13799392b1a07bab2c860fcae7be79387f07204dcc6d1253120392d65c878cca74a87c83cfd71cd2b8ea0