Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
af4a316da2bcab315fbc14e83cca8c1c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
af4a316da2bcab315fbc14e83cca8c1c_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
af4a316da2bcab315fbc14e83cca8c1c_JaffaCakes118.html
-
Size
175KB
-
MD5
af4a316da2bcab315fbc14e83cca8c1c
-
SHA1
883d715b6a8e4b9239e5a38031e48552a0db0747
-
SHA256
212cc425d7251a3fa99f359ebfbd2d86e74d33916b79ef8cfb9dd1cb96298708
-
SHA512
5d7208ac7b39b2df301fba16465b20f2385872cd20b34d7ca4598931e5c8cb6c9f058a3d2defddc00665bcc21d87d5f68e57f68140ed93e5a702804fb1bce744
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3pGNkF+YfBCJiZn+aeTH+WK/Lf1/hpnVSV:S9CT3p/FXBCJiyB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 4468 msedge.exe 4468 msedge.exe 856 identity_helper.exe 856 identity_helper.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2104 wrote to memory of 740 2104 msedge.exe 81 PID 2104 wrote to memory of 740 2104 msedge.exe 81 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4532 2104 msedge.exe 82 PID 2104 wrote to memory of 4468 2104 msedge.exe 83 PID 2104 wrote to memory of 4468 2104 msedge.exe 83 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84 PID 2104 wrote to memory of 4680 2104 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\af4a316da2bcab315fbc14e83cca8c1c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ec6f46f8,0x7ff8ec6f4708,0x7ff8ec6f47182⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2852 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2872 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3572 /prefetch:82⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,8549017081014537798,6464647605111993658,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2484 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4184fbae-0e42-4176-be87-368ab48c3183.tmp
Filesize6KB
MD50bdeda9ea348f31d353e1d6fa0028ffb
SHA1459f9e8fa4503e86ce1ebb60911e30a6a017ad6f
SHA256e55506457cdb4aba674fbc2d66274bc3bb4b54a47eeec8d35b4ddba4779d5d22
SHA512deab5af514e62df3d5b6214cadbb0969cc1afbbbbb6bf20e42723fc1d7153e24f5a40a2de08de48b3b64284534029dd7d6468246a906800c68eeede03643a0e8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5420fcf49ee167ccf2ea29521cd119fa9
SHA15bdd77ae9e45ebf17a64cd73eb7a42729068de01
SHA25667fb08ec7a61458e8354d162de7f2c7e0acb8b5f7b4e50d2e178ff3dd29a23eb
SHA512e7e90f849803e4e6bef0ba699da2b9ef01fe957191d174812856bbd6e02e49dde458debd9f428ea40359b69c5f96f58aec9e81b894e7025ab84c47614ada26f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize72B
MD5c6e93691f4a69e5faab3a85b34d17e4c
SHA1265e75f96eff89602554dab54d66a5308d6b7ec5
SHA256417035aa3c406ed5b463f4635fc811be307b5901ff07810aef51b343e4b4099d
SHA512ece546e6a1b9ce2325e097d85be28e4de5a4be7fe65bfc73b6a0fb7496c7eb9f7e4bcc3c41c35f3b32c8dc85651f59b4fdffc308a1912871023a91f3f8bb4921
-
Filesize
2KB
MD5f6235d8daf27d9effc0667f6ae42540b
SHA178f190eabca1e2dd884bd465226eb9c5038a290d
SHA256985416a05f667774bce2afa07b9d880954ef4143a9f9e834344ec0472aa5fabc
SHA512d896ac0956e41ac969323fa941d68c669a3f58eccd028547732dc1877404475b204eacfc2c0729c1d3507dd2e012eb983a70731a676cbcc13c6b949623625a46
-
Filesize
2KB
MD522b36e7ea673f1acaca01ae0d4e710d4
SHA1966124cb4af85d107990b82566cfa1df23563292
SHA2565db64d481f4018cbe06d449c929c2b0b3feb1c993dd0f7f7f86f622addde44c5
SHA512351b640ce4d3ff6bced43be5f1419f7137feed3b1c895aa1ff2c28932ff8118fc4d64682d4eb639e21b275e3ca95bc002a69e0ab9bf3d32837590ee954b5dae8
-
Filesize
7KB
MD50827efc558fda4a862bb36c38d64285a
SHA16d237d0dd95a0aee47e4fbbb61b8279a6cabe844
SHA256c7820c7384a43a44bc1689197c20326b0c54a1fc691cc50a0ea961629f84670e
SHA512aa9bba2874024948cb8e4ea30b9db376f61deac180b75e832fe8ae48f4ba95ac89fd02aa08d78b49e219e9eab5fd43eb9bd96c88c694d825f0fac1ac8a72206f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ba91f3f772ad95a7255c31b82140bc8f
SHA1bff017df008aecd4453713206f166e8abb653a81
SHA2568d3f81cf10071362abd804ec85b4769f625a06a9450bd9b41ea9a25b185942aa
SHA512fcd392b7f1742658337eb40989eaddf304cfa68ab2397f67241779c00ae3e2d937b1dca8852c94dc75d887750d470367d052d51b1ad1a2804283c0dcdc0316c7