Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
63c1fc144241f0e154a2d0e3c1593210_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63c1fc144241f0e154a2d0e3c1593210_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63c1fc144241f0e154a2d0e3c1593210_JaffaCakes118.html
-
Size
176KB
-
MD5
63c1fc144241f0e154a2d0e3c1593210
-
SHA1
a460207f701763380d624602ade82e88a271cd18
-
SHA256
f2537edc887526f7b2ca930c1439651ef8190b661047c1f8918103b6250ac56c
-
SHA512
4f61f1454bac82980375ae60575f7282c2d0c1e125417a4b1f02da8d9cd08d8d658d5a65642d668fb5148ff82ad32f2410eed61d9bae65e9c1f5a6e5398ba59d
-
SSDEEP
3072:XBnss57GFj/yGqotHD0fv92j/TgyeoxVzmz/NlPUsnUU6vA/Fe:5ss57GFj/yGqotHD0fv9s/T1egzoPE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 856 msedge.exe 856 msedge.exe 1924 msedge.exe 1924 msedge.exe 4424 identity_helper.exe 4424 identity_helper.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 4708 1924 msedge.exe 85 PID 1924 wrote to memory of 4708 1924 msedge.exe 85 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 1616 1924 msedge.exe 86 PID 1924 wrote to memory of 856 1924 msedge.exe 87 PID 1924 wrote to memory of 856 1924 msedge.exe 87 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88 PID 1924 wrote to memory of 1032 1924 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63c1fc144241f0e154a2d0e3c1593210_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa445a46f8,0x7ffa445a4708,0x7ffa445a47182⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10600046369089515258,14942191019147925774,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,10600046369089515258,14942191019147925774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,10600046369089515258,14942191019147925774,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10600046369089515258,14942191019147925774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10600046369089515258,14942191019147925774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10600046369089515258,14942191019147925774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,10600046369089515258,14942191019147925774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,10600046369089515258,14942191019147925774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10600046369089515258,14942191019147925774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10600046369089515258,14942191019147925774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10600046369089515258,14942191019147925774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10600046369089515258,14942191019147925774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10600046369089515258,14942191019147925774,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5504 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5ae1b4adf3eea8c4922221337fe1350a1
SHA1fb9fed7ff65abeda22fe356d441c264e906ccb20
SHA2569030561244b088ff84119a5a2cbd848b55a922c95b0e466cdb2aba94e02f6c5d
SHA51248ce03faeb76ed723c8a3d7c9b1017f67cbcb754202901f2efec085e59d016cefc87f652a9f95ec9b032fdd5da03064e7a61a5d2f8e9e28466b9633c7df0044b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5e8e69637da4d37af629619ac7d07ece0
SHA167a1fc1b516a2f822e724670881c6441e0a23291
SHA256c14617e72db62b3b32a3e34e17fede642ba424549046836577de698312fd6c04
SHA5123a80628db2dfd9450b3048e935e8d8059bdf61ba3c6b72625df3fc369cc1669f6d98e7c000e6e07638c471ec7afd0c9b7ed71564d8a58b40ee634f62bcc72aa1
-
Filesize
1KB
MD5bf177937b02e31f7a9f4e4c221dafcc4
SHA12b9aacec7179be113c111b02ea93a0bce2b8872c
SHA25647427d6b32bae755cb4e07fc8851c3bedaf1a59d05028fc549d2e309a81cb2b4
SHA51284ffa1d9767325e916ce47c4bd4367862624103f5f6003059660f3047fcb736cc163d8f50acfab754e3d02f32abe4ad7020d82388b6a23221296fbf0b26c8638
-
Filesize
1KB
MD5dfb0928a40afe84c27207425a88840ab
SHA1a611a1af1410f749e8862739c87a1577d6f80110
SHA256f12e0eac089ebc27b3205d8c6f949eaaa847405f136fbcee20399210f507a275
SHA512600d9af88a9dd1065b9690a54f490edad7c8c1ec2683268236c03ffe3b9c4f678f9d16bc9a40758280d29f535b078a63bb4bf29a14e8b5e3243c048055461f62
-
Filesize
6KB
MD569a5038ead145400a9feeca348b3ea46
SHA1d917a6d08c93ac0c158ac769b460e6a7bdbd48e2
SHA25656c2141c8f0e24242861bea1fac0f32e9a11f758e4ffb34a4ad3158ed173bbe7
SHA512d504b3edb71ee75e3c48443957e04cb602f182b6c7f067638676ad9d2eec99c6e695a6b0b559ae51c3c2a4d557fa5b53acb948b3fab7a90a453b75c83c0356c5
-
Filesize
5KB
MD5c6e1c9b83e952cfc3918b538c94a17c1
SHA13572b633d8cb45bfddab3ed36e5fa4e5fd25ff0d
SHA2561d2c59ab661472dca43f62452fecc60b18df98f27e04ca82de1240a45061abc7
SHA5122275880a6fd5cbabee1eabf4ee2a79c904cb09d66681f173170bcf0ab950af0cfb69df6c0249747ead920d330c0fad1c392f3fa4d0ad43fbc1a64e06be4de10c
-
Filesize
6KB
MD540ae8ee1e439943a2444f49c91ffb5b5
SHA1c38e86a2b4b9bb771965c56b09aae9f0e37cdf72
SHA256ec36efaf1e55bdd57751b8145c27f711349348d08509a5c51e6122baef4516e5
SHA5126e4c43fa0e26ead249a46c1ca32b4d81a603194341f16a05a6a9e98b9633cd3d34d9e7fc2e243b51f97158b85aeb517b9cb8c4502e9f6f0316eee42d44b91d07
-
Filesize
6KB
MD50d89ffd72555445467c32319abd4a757
SHA1620154cf1e113d07b75bbefa8684f05ecfbb3fb5
SHA256fe823de561a6f410fa5b66feb3c85e8df53873de3abafba814914273f7bf8d3f
SHA5128dd188e6be9c192b254ebae846eef5a0bfbca182e551cf0d1ef910e5e10f071fc14f0a058b29a54aadcb26792c9f0ac13dd35f93b50bd7340ebb0bfaf9ed0836
-
Filesize
7KB
MD54a8d329c801c4dc86c6b6a2a280e9542
SHA18d5f2743af582173b0954582052e74091c5328a6
SHA2569c6122c74fc9e5077cd28e541416820a1b41e7a11d1c2c166ce6bc7cceb732fb
SHA512d2e4d105bc770b84f27915eb95dc6fef8a7a23bd5ca2b0d83cf72a8ba172c03179d16d08b2217a2b1d6c911d2c8a3b550d8803b3e348ef232a7f9fd43bf2b74b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56473b74345736dd624990d9e4040253a
SHA145836cd628b37833aead886c3ac3e76715be5cc7
SHA2569d894ab7acb010c123e43598c512d03545a211433d0b9c9ed8cf3a495ba5b032
SHA512971aff065bcf539710bf8ca8d15b33e304e9557a4ffa79143dac13f2c8ab330e812a6ac705279d15c79f280a9f4821f8910de157a27e39cf12ce983257cf27ea