Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
2123786b23ce6618c66a6288b8a23c1a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2123786b23ce6618c66a6288b8a23c1a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2123786b23ce6618c66a6288b8a23c1a_JaffaCakes118.html
-
Size
99KB
-
MD5
2123786b23ce6618c66a6288b8a23c1a
-
SHA1
830bd840acdd67e5ecd96cbb5f7c6f3f5e3af5b6
-
SHA256
b00afbe7d4336b979345183aae583aceff4649ae710291c542d55048b06ecb75
-
SHA512
fd65e2d27b70f8a5b60c3768b08fe1c8cc7981e74512a47b56602e89a8944505a6a8af8d5b5e7d73895d350722a0391189f70a3b741e03b2e1dc4e0682b2ee43
-
SSDEEP
1536:oeimMrbV7bZpI5tOQ4yWOQV8rgrObbX1OQF1nF5OQXKROHt6Ibvclq3EmIX:oPmMrbBb/IDZx6Ibvclq3EmIX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe 4364 msedge.exe 4364 msedge.exe 3888 identity_helper.exe 3888 identity_helper.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 224 4364 msedge.exe 84 PID 4364 wrote to memory of 224 4364 msedge.exe 84 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2012 4364 msedge.exe 85 PID 4364 wrote to memory of 2692 4364 msedge.exe 86 PID 4364 wrote to memory of 2692 4364 msedge.exe 86 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87 PID 4364 wrote to memory of 60 4364 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2123786b23ce6618c66a6288b8a23c1a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd13c246f8,0x7ffd13c24708,0x7ffd13c247182⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6284 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6380 /prefetch:82⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6480 /prefetch:12⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6456 /prefetch:12⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,11777409497021372641,4030153284984879316,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6556 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
200KB
MD5a484f2f3418f65b8214cbcd3e4a31057
SHA15c002c51b67db40f88b6895a5d5caa67608a65ce
SHA25679cbe928773386d07f0127f256f383debed5ccea5ff230465bf46ec7c87319d6
SHA5120be1bb8db08f6e6041a85cfee90cd36a5b595afbca34d52a125465454fc806b4bb7ae569eaf4c882922fb1b962b6060534e597791cd0ad23483be5981d9be85c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5d658d5a3452f0f34d827f1fc1a5527a6
SHA1b50632c503e44d1b8c4f9d1d66fe1bd111e979b0
SHA256a9afabbecd8562c82a19176f6c7fe54f95b43b5fc3d7d990ce75089e0c346a73
SHA51206a39fb698a118b418712773d50d47b3bb3051a8f46642e5f741677de81ff5203c371366e374f243703d3ebb4e94216eb36b168fa3526e1407b806a770cc706f
-
Filesize
2KB
MD56f6cf109f216b29743de3ee2e082dbdd
SHA168524b41fc0a9857e678273335d848a0c5e12f0f
SHA2562c05a1c85a4a687a29e280b38ca363761172cb36890ff00d25b95d5f92e2f583
SHA512a9903327cbabf244b43056edfde11fc3c95598f83f89698df95f2f8b29c1e4b617e46b9d491f45b38510e44a943ccbb6fd2c4c4e29f9bce83cafc5ae8a7c3b91
-
Filesize
6KB
MD58f4755a222320b6384145b117365e552
SHA16fb825d5602f7c7656b6b1c263709d25a11125d1
SHA25616c1875210084ddf1dc35f0b497844b053bca1f19ef681cff2b96c401d0c9cb8
SHA512840a689564679e1f8ac8c402fc02af9e2ab482e33f47553c33424896d4269fca2249129c9f565bd1626fcbc265b55997503090c24e017dd9418df1e691e2fcdd
-
Filesize
5KB
MD5fbc89e9714c8225d196dcc122b5aae1d
SHA17a8f08cd16567785fface83afc99bc31535e0751
SHA256f4a281e246de49e87547e230b3dee33976c3a7b26fe517584c9b8ee968aac578
SHA512c2644e5b4f27b70554fd515f236ef8be701eb53769e9c6eaf2407bec04bb053c5b4ef14517371d9b8b3810f1780d8e724616f4f9b4bbee0319001137ac033097
-
Filesize
6KB
MD5b52b6cdc027b32ee575d3a98cbf44b52
SHA1a29d082a026b354174314d8cd9bcb03190d59f4b
SHA256a3f3d2b5bf78eb8f18e1c32e87c84bfe0258243bb8841d3bf81a22b6c3d52f83
SHA512af04d64dc8190ab9a952fd65c8ef4acdb1b465f83112184f1fb1e0832ab4eafe5b073f56f67cc993afda0ff1e1231bf4d702bee67b036f5b6e3cfc0f6803bb56
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56b8c4896dcb576165913721375720bd0
SHA1fcd33534820f45c8907bc89643f749c640345704
SHA256ab854d24b9bb8aaf4814a5f91f4e1fae11a862c84b9f9e3838c5b0878104fb4a
SHA51250fa6a6e389e83bc74d0f5b0f7c38ede1ff582cb3f13a51286c8299c93a6db0566a3b9d9452c26596456800d62142fe075718c675a52f132986c5aa6fd2a65e3