Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
21b04f0d51aa1e762c31181e8be4764b_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
21b04f0d51aa1e762c31181e8be4764b_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
21b04f0d51aa1e762c31181e8be4764b_JaffaCakes118.html
-
Size
21KB
-
MD5
21b04f0d51aa1e762c31181e8be4764b
-
SHA1
1b5db38a5d9cb2a587ba87be76454aa02a10b0a4
-
SHA256
1ac615e76905d0b29722c542206cc655f81e9fce8c1ba80705ec55cd10627f4f
-
SHA512
46c4350d954a401434c3e74c4ffeac3d28bff0e371096bfcd9d15da5d7fe833cbe5d3a7fd1c11a0021f129c4d1e8d051fa1ad206a72a7bc270dfac469f9e7985
-
SSDEEP
384:Qu6BK+o0lAt3ggKXFk00ITH/rYjC28N+rjI8L:6lNKTjL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1780 msedge.exe 1780 msedge.exe 5004 msedge.exe 5004 msedge.exe 3788 identity_helper.exe 3788 identity_helper.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 3756 5004 msedge.exe 87 PID 5004 wrote to memory of 3756 5004 msedge.exe 87 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 3352 5004 msedge.exe 88 PID 5004 wrote to memory of 1780 5004 msedge.exe 89 PID 5004 wrote to memory of 1780 5004 msedge.exe 89 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90 PID 5004 wrote to memory of 3284 5004 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\21b04f0d51aa1e762c31181e8be4764b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82b7446f8,0x7ff82b744708,0x7ff82b7447182⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1912 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2108 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6532 /prefetch:82⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3036 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,11096190906696007666,8325622270036964470,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4632 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD584973a65bcaa027bc59131d1dfc1079a
SHA17bee087576dcdec125f7662a33594357ce21d98b
SHA256a2a23c48698b1aea7aedfaf1afe9c4399308203d5dea64685a8665dc11e6cba3
SHA512500beb7668d902e71ef29a5c626b68a05252c6fda2853b91909ad8ff452a56565a4f34cf655c1d6a5c8afe24edb3156734316685f9989360fc2ebbe53a974c85
-
Filesize
614B
MD5f71c896c0dc185a5d42dc5f3e4210d52
SHA115073858ca18aeff00da392eb148e610e3745376
SHA256005f680e690a2ac9a19a4d404ba3c07a7ef1bf93394feef990a1a0c15dd71b17
SHA5127ac3d1c43c8b5d627bd79476c5d4483c3a846e160e6dacaf3c2e11569034cbed198752f05146701d0ad7465563ce3299f3fb46b26f8dd102122191ff1c5be40b
-
Filesize
614B
MD515a944b5c0ea3fbf9b50e3f6ebd09950
SHA1336cef12dc2d0fb11aea510dc5080a666048a23c
SHA256ad11529f3baac24e1d48ceba68761e59071b5c4ab3bfee6c43d23b97be2c3c45
SHA51220c4803327b3690b8489791d563d0717ef808b6d5ee856495cdc46a2f9906518e79adeebabc6f0c4e0ef2b7abd2cf9edf31c9eb5232a3aa0057ff3d61897af44
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1KB
MD5a0fbfb23f455f42a17ee6b2452045331
SHA1f102f2f25dbc2eae3c4a732ed74c744b9094b52c
SHA2565e90c9cad5e21126d2b72384d95c6cc3c5f9bad6f1d9c1d36f5fdd247550e511
SHA512421ba10608f5d9251a5d55b5a8940f101c2c6170f7aa440ae0cc23a8eb90e1fedc39539ec7869e72c1e39da906bab147e72d82a3de1d2c343b5a3705123a1b48
-
Filesize
6KB
MD5ea257f6592e2650322e09ae97a1eb71c
SHA13f3a970dae3c442a883daadfe0fdc4e3269695c2
SHA256fbf32eee6e05afd4daf18e8e27f7dc73cceacd3c2769e8b5d02e6058938314c7
SHA512f5f6ef6f1a8ae52670a53443130fc0582d733cbfe90c3a91b32553a4db4bedf03b31e30d3990ddbfaa2dc2256ee5f9b788e2ad7addfc0f9e33986a41b6c709b4
-
Filesize
6KB
MD51d6983152dade46eb5e97ad3e6c362d4
SHA18189c3472c93e76b00536d2de5badbb5c769160f
SHA256b160b4a135673c2eaed0e72e2585309efd715193191d05744fc20e1c95e6c4e4
SHA5123c9e0b6ddbde723889fc5f615c4485707bd71bea5300c077c8c6582f33288e0e74ea042d44ac0582f9852b44e4719053f00219b5935b80d3b99a7645a96dd672
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD504f392d6289c1d90054bc617d3616302
SHA114f5d77d9004d05062955f0c0a7d5ed9bb35f5a5
SHA256a0f6c723f83822f6d4c998ec856110ae4ec26c8dbb9591346498dab1467aa328
SHA512618a40da860c2ddb414b6ce258747325832151249811b0ea1b5c0d8d691c94c0e159c879d5e14fff9c9bd72b4e059428e4faa4c7d36ea0f79cf8c2c0cbf1fac4