Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
22e1b90cca9b559eb5fced987aa3943a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22e1b90cca9b559eb5fced987aa3943a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
22e1b90cca9b559eb5fced987aa3943a_JaffaCakes118.html
-
Size
49KB
-
MD5
22e1b90cca9b559eb5fced987aa3943a
-
SHA1
6c7052fd8251d6387964d1198924ef1405027edd
-
SHA256
b12b3dbb06de46aeb9aba27c340738bf4989d56eaf97e08e20da030106fb1657
-
SHA512
1e810ec42b1229e3ed2303e2131389913a42466ed644f25a412ee650c434901449186f7f65bc43d06e9d5c1ee6c98d7e35b1873dffe3a7e7000a4238dd832c3f
-
SSDEEP
1536:k/30/vaxwH4b83VNRGIdyOxq2xZiZ2xIi7oKkn9yfp:k/3Ec83VNPRxYiJknAB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 3996 msedge.exe 3996 msedge.exe 3164 identity_helper.exe 3164 identity_helper.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3996 wrote to memory of 4236 3996 msedge.exe 83 PID 3996 wrote to memory of 4236 3996 msedge.exe 83 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 3764 3996 msedge.exe 84 PID 3996 wrote to memory of 4532 3996 msedge.exe 85 PID 3996 wrote to memory of 4532 3996 msedge.exe 85 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86 PID 3996 wrote to memory of 2284 3996 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\22e1b90cca9b559eb5fced987aa3943a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffdb2cd46f8,0x7ffdb2cd4708,0x7ffdb2cd47182⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14903610673820244074,13361073569744922056,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,14903610673820244074,13361073569744922056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2544 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,14903610673820244074,13361073569744922056,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14903610673820244074,13361073569744922056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14903610673820244074,13361073569744922056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14903610673820244074,13361073569744922056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14903610673820244074,13361073569744922056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,14903610673820244074,13361073569744922056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:82⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,14903610673820244074,13361073569744922056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14903610673820244074,13361073569744922056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14903610673820244074,13361073569744922056,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14903610673820244074,13361073569744922056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14903610673820244074,13361073569744922056,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14903610673820244074,13361073569744922056,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD53ffed1672cad26e32da669d99f1df3ae
SHA193527880ea595cb44657a14603b901d04c9f1c4d
SHA2564801c38cff57bc9782836269f6f4b30c695b9d46bb721860d1b3cd2cfe3ddd28
SHA5129bf0cb6886f7dca42fcee3d8c0424bf7c34982a08c7c3bc189ec276513a430ff9ad0d70f1727da3ed6e289d182a177c98fb18a25aad0739966c2ae80752b44ea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD547d0f7e3f4c791dbc979609984dca4f4
SHA105bbc77a45e2fb56cb79637513ae4678d3d8bc2b
SHA25626c2e6063113540580522643295c01ae60112822970c5e10dc32d16772a13556
SHA51227fa3dbfe51cff9f702d8924dd377768a6459a605a454718995ac1a279f59d661d8c3148a4758cfed3af9a781c0eda71f58ed87349081b3fb636384133aec424
-
Filesize
734B
MD5a56b9419ae3322057fe635cce29ca4b4
SHA13c6f73125d71011792f7cd9ea66310408da88929
SHA25625f104f27e699b0f9eeb4a44663e2be45fbe35ee41db0e24c446a7b8674ff304
SHA5122ef0a9b4073a719845e74b605e2cc95218c048cb0f56c2a358ab4976eac8f6ce7f4286f577e7242048efabb34d33d200e597cd031a4531c3b78049007e005bc0
-
Filesize
796B
MD5a50b051912ae3e886ca1d771ac05576f
SHA1a1546b896d4b1c4035fc7cba82db150a3fb0fe04
SHA25658a93b0e4218e167d600df14866ab8a4350b6bc5eb5532e987243832dca2a9c8
SHA512570392736053adcb5efb858964f9f97c118b083b96171935ed0fb9f712aa289629524440558830b7c334d55658cb5adbcd942e76a43ff91cb07de6157376f140
-
Filesize
5KB
MD53ee8dbe4c91edf4c9bb5eec2147e6cb8
SHA16f57d56c995c81419f6ff3ba68c847697548c02d
SHA256f5b710a1f16d15eba79aeef2b084e06b47f7b7023c34915ee5e8bcd0854c50f3
SHA512d8244596f142b490ce9372d80fbf0f1482679f5b6ca2d227f2c63152b02d3f5ba33bc9c77dcd973e58ab10f342f516b5bdc22849479e3e5b8eec201ecf74b8ba
-
Filesize
6KB
MD55f9d465fde79c46cb8d38760e3460be8
SHA1a2552a110bdfd1d047d728c53b97184b514fa7e9
SHA2566a205b13fdb99fc2d75c8e23b6f30047a135d91877c1400e3f9eb7ca78ce08b6
SHA51220ac16c7aa42b8880ca476b91237e1af58af135a3a911356b816e2e49c1dbe8de4b6f793b3ca57ca77411677dae6be1c901297fa4fa12e76219918507ed16bb9
-
Filesize
6KB
MD532723ef04fd783d490e3fa54be6a860b
SHA117585b985cd657ce426ea6634e05a9b3bae25ad6
SHA256a328b148927b2df34610159fafb4168a67b257c0db4f82f8b0a2ac6de8ee97c5
SHA512462278ac04283f7a8906a66945fd68ef73a05071ff0b4be32256d640f4ce202ac74a731b00f353b326549e779cf4b901ace1668472fed9cf5d7713ca42705cd7
-
Filesize
372B
MD5ac425d0e4e778f1b0607d8c8f658b409
SHA1f8a12836beebfadf8408e4e7290d14bb65216b1c
SHA256d289d231f8f64ca24a90c7a70e159e86cd8d730b683028e259d1a4702d51ff7c
SHA512356ab86b8276a54def93cf6a72221d251c866d28d8db7e103374973392d964a03edb7617cd4ca9c4edf43b6ba0041f6fb4c9ca7f0748b1362c338b0a507cfe35
-
Filesize
204B
MD59bfef48df1728155881ac0fd246c25d5
SHA1dd7706630a6e4b17a08952e35872c2a826f78c2c
SHA256cbfea37c874b5475e5048a0e2c56871dceb9843b763b1e0eee08cd1885c102ea
SHA512f8eee6c05bb516f2ba3bac602e98534404b37d190ac2358df3365f40fbd805eaaa2fb803fe6e969d5613fa5af1983b06c07eca8ccc61b2ebe5c2701a984fc12a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5885e20efa58997ddb63da92b9abf3009
SHA1dffc42f719a7a40a4af022d13a5204962d85d987
SHA2565c631d261d8c9b0f74f114bbc491f39d3ae2965316849a08dfa5833aec90269a
SHA5127d68763a0cd4649857b92d26086ad45f83e05778dc473df4582b26b20913a39fee49c631f3e3eba0c686b528f6e9929fbbc0e55b2183ccb63ec02478ca21a501