Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
68838f25158ad7d61dafa82f4ef5f921_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68838f25158ad7d61dafa82f4ef5f921_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68838f25158ad7d61dafa82f4ef5f921_JaffaCakes118.html
-
Size
50KB
-
MD5
68838f25158ad7d61dafa82f4ef5f921
-
SHA1
053b78b43a061722b317d5b9b6270ea015862c8e
-
SHA256
cb762d523d2e21cb99b21651aa5175ba533a53593c8ee8b97109ce8a333f67f5
-
SHA512
4ca6138bb72efe7a50f5715af667cb734188a34cd8594df9478aabfa0a95a40212256bfe36cdc07f1f5bce6b5149ffbe848b6c36655228f58f56e9bc9ce56658
-
SSDEEP
1536:fdIEYlgVy21VsH7IeesdtBWG71vy4JWb7HofeVzVYzYT:f2vQ2L4oJWb7HofeVzVYzYT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 2408 msedge.exe 2408 msedge.exe 2828 identity_helper.exe 2828 identity_helper.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2408 wrote to memory of 3468 2408 msedge.exe 83 PID 2408 wrote to memory of 3468 2408 msedge.exe 83 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 2368 2408 msedge.exe 84 PID 2408 wrote to memory of 1880 2408 msedge.exe 85 PID 2408 wrote to memory of 1880 2408 msedge.exe 85 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86 PID 2408 wrote to memory of 1764 2408 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68838f25158ad7d61dafa82f4ef5f921_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2a3446f8,0x7ffb2a344708,0x7ffb2a3447182⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11710306439797820759,5695058560231400910,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,11710306439797820759,5695058560231400910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,11710306439797820759,5695058560231400910,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11710306439797820759,5695058560231400910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11710306439797820759,5695058560231400910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11710306439797820759,5695058560231400910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11710306439797820759,5695058560231400910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11710306439797820759,5695058560231400910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11710306439797820759,5695058560231400910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11710306439797820759,5695058560231400910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1728 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11710306439797820759,5695058560231400910,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11710306439797820759,5695058560231400910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11710306439797820759,5695058560231400910,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11710306439797820759,5695058560231400910,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD517e70d0f2fd7f07eedafeacbc3ed58b2
SHA1a2dfd51721256c9b45042b87e8e119dfc2cb1397
SHA2568237d4fbe0c9bd55151b14e3b074823ee0b86ecf48a833de238251ee2e1fba97
SHA51290b1bbefc97d2bba37765a4fb4e4d106276cd483cf50dcb837995028e9417528f97eab9a910320c2b671173637acc8735820499d22880135e63284cd7b929cb7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD57d1989cb4cedbb606269244a57f884a9
SHA18d4c1de9897e0ae593c1ea66ca3110b0b713f822
SHA25648116359f7d73ecc6dd99b942031abaa45e131c224ac0e0327e8431219cd141d
SHA512df1dacf29c0ab8cc50d3b79951a79a92b2e777dd7c925692e94d0f0e8e858ad3648942f51100bba18bb0581958a7f17c6d1e5be9731637640039ef464eb54dc3
-
Filesize
2KB
MD5543e982cfe389f790a0e2b71257b7c7b
SHA1bb06740b6f3d7f982c25f5d0dd04f1e83b09989f
SHA256eb0889013b0cce41e8c89c598b559f2b6758c028b58090de8d97e3602ea7f85e
SHA512c69710187c0f24c2bee94294267de50d6db3e927dedc29d20cfb2d7f21cded2fd21cbe8775af39ebbd2fcfb4466279f1d4f1da9c4d83f7657d703cd5ecce5a53
-
Filesize
2KB
MD581c2b0f46f47b12b314b70b75f52e82f
SHA1ee211c93347781711e577c4ce3d50de795e9244d
SHA2561d489be2bfad2220d0cb3c70a82851dacf8c0eafdf17578f76093787b5d87d6f
SHA512ac91ac3dc8828558d8fbf0938f42cf46143acc22998eeca1791fa1dd94e274788ebc9529c899b51cc59ea3eed51914fcfb0bef13305be8f9c7e136e9c383fdff
-
Filesize
5KB
MD58acd09b414898fa1f796923d7a6f9fec
SHA1f707a89b380743d6c7fb5e51b693176c6d07f804
SHA256e5e02e7f4aaf785cbabec84e83a4a09aeef46689e9148c0df7e719989b685dbf
SHA51208a1effed52ca19e0143d2a8fce7491bb5f8ceaa200cfc703ffad8d171467c303033e4e017e14bb44d3d29ded2f39b245243a4fa1720a408b239f968a79923a6
-
Filesize
7KB
MD52f7f09458edca097671f36b5be49e300
SHA1f381216cd7c8d96ebeafdf17f9250c36b3728823
SHA2561981b8cd5807eabcded09bbbf5d7f4987ae61e92f36c3fd66df8bcb811c9843f
SHA51266d21bdfd7572288d643c5244f53b79c2a78f7a211be8fd1311f9e9be50071f0995db3965a86beb6945f39a735d8fce3f054ebb5f45cc3a3aacf410a4fe05747
-
Filesize
6KB
MD53b80397d2c1622c0df0e452a4ee47f8a
SHA19de87bbccf168b0f1524e9a833011eb04e3db429
SHA256feae64f25536ed55d44d6e09961581e7a829c0a7c6ed0444553ce8ba0eccdec1
SHA512a5eb1456d3827acd4780ab1987ff0126ebf7e70b51a8473c1869702063018a647c573af3ebfc42cb151021396a4aaf549675d9c52f64990d17a96e5270c8c0ff
-
Filesize
863B
MD5f2281ae581e62da7073f1025c883555b
SHA17df542a362f67cf4818b630ce50747f49053766f
SHA256ae1e1e2cce36c70ab55185a91a628036121422cf12c78e5a265da3ae023b53cd
SHA512ec1e5af12005399ac0cf110d43ac69a6840d3b1b10136e27ece81cc2b89392bd7936908d489616abaa738b785b4e9aaa7f6f717ed5a4397644a9c568d6e7d73e
-
Filesize
367B
MD5638ad010bb5bd600da91ddb6ebfb2857
SHA1c14629e00e1e534ffdb5930fafad5d07d2e25903
SHA256b720bfef978f5bd032d313f5dd2293f3e5ea61527039a2d75661fb6fdbedae28
SHA51222376b0e94e26a07cf4e6ddbf76e6e20efc50372c42e0e67656888c55c267641eb5e56ed5bbfd80d20b0dabcae20e20a5dd3ca2754faf49d88574712f777df20
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5626b5a17ad4a0e5cc649966def3dc91b
SHA119708b19d6e8ea66ac70a77911ee5061d942e275
SHA256e19fb70d8517ad1a93e82719e04fd5cf26061d10c734cd07a8c7e27abf24d0e2
SHA512779b7c40a4ff4f4a21bc73c473acfb52a573ccea2fa19919934da6165881f39faedfe8254b65f22b96fabe2f4df215bcba769bf8cae50771d29cc11666555a9a