Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 16:50
Static task
static1
Behavioral task
behavioral1
Sample
bd5a428dfcfd2a2e78f30887ce9ef4cb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bd5a428dfcfd2a2e78f30887ce9ef4cb_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
bd5a428dfcfd2a2e78f30887ce9ef4cb_JaffaCakes118.html
-
Size
300KB
-
MD5
bd5a428dfcfd2a2e78f30887ce9ef4cb
-
SHA1
5a0fe3c6df59fb7edc57eecbf61b8054443c6bb8
-
SHA256
4dfa406854fa48cf11c1f7b25bec4416ce99e38f7d5440d5cb7b4ecf0193d520
-
SHA512
f42d580e85d9b6c7ca1e62c714f9784714ca6d6c8f59bf1d3a05b09ec35263ea08c7f131b0e570b96ea7346b3216ea3a2d1e172d3d3176bbdac1da277321989a
-
SSDEEP
1536:iD+SbTTF1SjTvpNkltM/jVII3IbIre0kVHmp6oE6JLnvuKishIw3Q9dE6edSu1ck:o+SbTTFIpItCVI21uOcqiTCH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1680 msedge.exe 1680 msedge.exe 832 msedge.exe 832 msedge.exe 692 identity_helper.exe 692 identity_helper.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 832 wrote to memory of 2076 832 msedge.exe 82 PID 832 wrote to memory of 2076 832 msedge.exe 82 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 4624 832 msedge.exe 83 PID 832 wrote to memory of 1680 832 msedge.exe 84 PID 832 wrote to memory of 1680 832 msedge.exe 84 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85 PID 832 wrote to memory of 2848 832 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bd5a428dfcfd2a2e78f30887ce9ef4cb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1c0c46f8,0x7ffd1c0c4708,0x7ffd1c0c47182⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,124454381627407845,17066532678130248092,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,124454381627407845,17066532678130248092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,124454381627407845,17066532678130248092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,124454381627407845,17066532678130248092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,124454381627407845,17066532678130248092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,124454381627407845,17066532678130248092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,124454381627407845,17066532678130248092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,124454381627407845,17066532678130248092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,124454381627407845,17066532678130248092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,124454381627407845,17066532678130248092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,124454381627407845,17066532678130248092,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,124454381627407845,17066532678130248092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,124454381627407845,17066532678130248092,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,124454381627407845,17066532678130248092,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2312 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5a962ba4dd614ce2b5cbb25927b7daee1
SHA109926afd5a86173497677285d1381259eade3404
SHA256eeeffc8d3dcd11305fbe558d4dfeeed5142a06a80273d40064429d86fca6e332
SHA5129460c4cd1e19b7e8196585967a75f40482c25567c2bb3aabdd85b0b798b02bba706a20b2d557a927c38f203dc90ce6f2d552e6a46148f5b4b5e649bd2396ef97
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5b7df288c37a5b47e4aa688e86c91bcc5
SHA1099279104542874411f1083e9cac305f97ada197
SHA2567d866563a5f2832c6026ae2b277ed0e0749f3935685600f3967f0e64d9de9424
SHA512b5aa8629b720c87a7a27737434702454cbc6ed50342c0f37e6e1d66f4c7024c9b929fd3a8d3ef086fe738bfcc8d3f529177805c289b2bfcbaff3c44e5632ef48
-
Filesize
1KB
MD569ca22991523625c5b73f87a34b62377
SHA1a43d83d5b1a40233253f1fff332d3dac9cff1207
SHA25650bc08283e8b21235fe33db3b1d7c9fed00655ea2d72206ee6653437a96f23c2
SHA512b74834467af4db76c54fa44a4264fa2368c8a82504dff415116e322934270fd0aab93076c5a40c0b9f73e4b6665c8fe69be5fc71c75b06295eb0142587c40daf
-
Filesize
6KB
MD5b22f010746c2bb37fe3c0ddd1399d659
SHA108a7f7aedd2c01f04b0704133ce6a8bad58d0a32
SHA2564b8ad13e0925c4cc601985b59f78ad1fcf6d9b3c217d0438d5e6cc1233e33e0a
SHA512b51b947e24fa22f6971e7ca986870cc16f08f61c1dcdaecc84d15367900b5dd70b8922cae530e1b05ee31bbc71a9bfef288d5f15e363f7cd98f0ecf505559e19
-
Filesize
7KB
MD573f85cb362f219a8232e31f748d86ef6
SHA1a3c14b25899a3aaf30d24b863f788eb2504fb9bf
SHA256922568972b2e7bc986f571d4813acf72de7bbf35d323cae7441c1b8e06783546
SHA512f91078de5986b04f48554f5f4688f5d78c75c23be35a37f64202f9289ca92beba8e9ae11c80141f2c5c3fff821dd178c8c3f92963015ec3c6f417ef45bc51446
-
Filesize
6KB
MD5208809a9f11df2ab60abb602b49784b3
SHA1e87cde5a51420a3f7baf405b7f87c806cb35f4c7
SHA256790f4270c55fa5a6b61cd51d1be846545957bea18684bb4b996bf32e1d91e728
SHA512119f8c7d0fdbc257463b9262ad7f8a5a6e6345487d0b4f0e1b8bc85eaf5bf16273885c1268742fa0b27980577952b64e64264ea1fe3b0979a36db5d6cedad1db
-
Filesize
7KB
MD5dc7d57fe37fd15ed9110130df2572bea
SHA1b2dbdd540453e3a640cc52062b8818a46e0970a6
SHA256dbb9eac1da483c7cc0349823777f503daf6ea47015731735f301085c6647497a
SHA5121373cf9d5bd684971bcc59ea7dab728f9564770b471c2a959351068463259b00819801aee20d6ff302204779a2681878afefad68b4cd172f49d4d14aeebb4237
-
Filesize
704B
MD5396de905b960a9786716d47ec9d6e8b4
SHA122b6c92c62cde0a35ac4fa9823d351390dc20a38
SHA2569b7180a607473ae740274aa0f23ce900e63c4aeeb434ca6bb5e2d7521da32b45
SHA5124b129e0ccc4274911cb4cb2e9699beace8d2e6c6b5888df05c47561e26fd03bdfe85965a43ff8807fcfd91ea8f8379aef4acc7e361795fefb03e63ac56163fa8
-
Filesize
203B
MD52b99aff3021cae91522613a3f8dad421
SHA1fad99daf14a928993bb53dc1e5903488ea3b13cc
SHA25647cdaa928f263498408e48b3f43d704f1e34998bc02b9451f459822477d27d96
SHA512a82fe98f5289da31bc2d8ed0a8579c7a3a4a0b60538c21e0195047f0bd3e8d37063460762a8520bdc899c4e4df528ba6a54ef983b4c20d6f7dfaf6a17707e813
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52236b6ea16fb72ba4a14ac99f9444c84
SHA12298086531ffb373873d82f0fc60df3386be906a
SHA25664f0ada60534e2de13593878e6cc23bad33cdd571da507b3bbd5d859683c8258
SHA5122859b35e48213128eb2b2fb0262df13db7f1b55470d34691d2994b46a3ec395d5759a8efeadeaa498955f6b7bfe1f8720a461e23541908948c12626192873ff2