Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
36f8b0370a1680f83ab88a3aea1a5155_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
36f8b0370a1680f83ab88a3aea1a5155_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
36f8b0370a1680f83ab88a3aea1a5155_JaffaCakes118.html
-
Size
58KB
-
MD5
36f8b0370a1680f83ab88a3aea1a5155
-
SHA1
173989ab32b0d87ba140b73a253f267697b3368e
-
SHA256
13c7be5afaa5167c8339446dbada8198a0e3349d677c63cd01fade1f25dd8261
-
SHA512
68ae26c413299506ab40bc25834d1ead14ff9bbd0155a27d4d07b7d6c719eb1505484fa6f5ca7a87c64b2c0a965655379835c04c87a80764f0d6586868dda8c0
-
SSDEEP
1536:XFSk4hMZtwmHtDLVHv7obC1+ozQJTOzG1TCIJKMtjl8:XFkhMZtwmHtDLVHTc0+ozQJazG1tJKM0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 716 msedge.exe 716 msedge.exe 3320 msedge.exe 3320 msedge.exe 2988 identity_helper.exe 2988 identity_helper.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3320 wrote to memory of 4836 3320 msedge.exe 82 PID 3320 wrote to memory of 4836 3320 msedge.exe 82 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 3008 3320 msedge.exe 83 PID 3320 wrote to memory of 716 3320 msedge.exe 84 PID 3320 wrote to memory of 716 3320 msedge.exe 84 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85 PID 3320 wrote to memory of 1560 3320 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\36f8b0370a1680f83ab88a3aea1a5155_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5eb246f8,0x7ffd5eb24708,0x7ffd5eb247182⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1768,8972133035391440682,8508301278335090658,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1768,8972133035391440682,8508301278335090658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1768,8972133035391440682,8508301278335090658,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,8972133035391440682,8508301278335090658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,8972133035391440682,8508301278335090658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,8972133035391440682,8508301278335090658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,8972133035391440682,8508301278335090658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1768,8972133035391440682,8508301278335090658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1768,8972133035391440682,8508301278335090658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,8972133035391440682,8508301278335090658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,8972133035391440682,8508301278335090658,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,8972133035391440682,8508301278335090658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,8972133035391440682,8508301278335090658,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1768,8972133035391440682,8508301278335090658,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD596ef4ded6b1e6528a699bddbea3457a5
SHA1ea0a37579c0333aabd86e74c4193d3c4b72dd732
SHA2561be29f664fb08ecbf81064358c6b94db815dd5f987f01eff1ee4f8fd04a70ced
SHA5127d5de4b2f8ef20c19398fe0ebf2eece0ea7da174ed37bfbc191bb34d247de68ec15c658c841a1eee290af889dea4fa0cc297a8a22b292a247143c1c66cf46611
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD55389360314c089155ae54aec5d279180
SHA1c2b92ba2958007eee45cce3a4b74cf5f81570371
SHA2566724ca0f44e28081faaadde64ed2ea9bc8d750333dc152350ed0962c457bb4c6
SHA5127b1f2a8b6e0f498ab342caae582794d83f90d44a2ff4cf39a6aeeaaefee3a2c7098614810f7591675f72289323d3f201c467830faead0496c21f73f97a58e0a9
-
Filesize
1KB
MD59c6c4477fb1fae7213422a713e072454
SHA1dc679a4daf9e44b8b9995840d8f579edaf6d3a6a
SHA2566cc122ffdba0ce0d1b1e6e9a85e95edf5ebaef6d986ff5f0e25faed875ff7208
SHA512300302910e70918b27f81c4bf897268eacd1a222b36554cbc0d29b416178f8405569953585d42a69b7b930f101fceea269bdb33262e7d601d74e9715defbdf50
-
Filesize
7KB
MD5dc82eba05693ed6689d3e7f90019e5cb
SHA1f0ab42c4e3ebb18d834184d17b500e84f27b42a2
SHA256ff1fa0d0367153bcfdfa9dc5786128d237aa119cb45f4cd34daa4e30914cc9f3
SHA512225605f8039f85ea3bab1f1366009566919ac3515d1c1a1ede0e96f5eef9ce247e3440616bd7d3416dc12352d4d7db9324b8051956ec5ee825e730190d9cb78c
-
Filesize
6KB
MD51746f4a29805377f5c07091d6faaa03a
SHA1b614a484bb335975e398960da34cef17e54358c7
SHA256f6ee67e81ce9aa15c4bf507e7030ab11a3a46894c4b44794d085821ba38d30fa
SHA51246ca051f41f6ead6d5767f8c554cd92ea703ac771b1c0a5297f3d3da26a18bd65bffd95c592397b1a3c013c774f20817fa47d9e9bdc3d480a7090f49edfeab34
-
Filesize
7KB
MD56ec43b432654f59a207dd84840df413a
SHA1df24fe11402aeffe11fafc129e70076734060f9d
SHA256c539c0328e10dea53b92ec7f9aab26eae8ddf8a6e505299bd50aba835bf4ca9b
SHA51243582a5b1abdefff1e65f2fa8fab6e88b18b70552aeb9acff04373e9ab345d942fae84ad9efea8649920295196018a839f5e922f190f9b8d5fce3ca522e167be
-
Filesize
7KB
MD5435d9caaca47a766b18ba517b49d74e5
SHA120e0d26c54f588a24561fcc806fc4f822321a6e9
SHA25659738b4a4e6f1b4851f0fa98d6c466553791fee186d019727dc1d13b71c13709
SHA51207daeabe0ffe1112b71915755fa6b6cf87d4505a07d92c6a60bfed798331595bd45e12bfa92afc37da2219e52227ac1ee74242d832817486bf3ea58bf838179d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD53fcb89c46c7c804b2e303d98ade0781a
SHA1f3049b2978629d9a8e203f7fb1369c12e5e24cef
SHA25624257adf164f98e1d699bdac7af07146ec0a9cdd450954806a3c237c7e135898
SHA51215cff5c5d51024440f4ed0370d71b9605cfb16fc09114f3000e9aad3bd9216ff19ed0cc2f9db3dabf81dc85385a72269db330449b1bf53671a681eda7eec012d