Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
341f98cea346983dfefe6dc5970efb3d_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
341f98cea346983dfefe6dc5970efb3d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
341f98cea346983dfefe6dc5970efb3d_JaffaCakes118.html
-
Size
59KB
-
MD5
341f98cea346983dfefe6dc5970efb3d
-
SHA1
c72c91e3e7d5cc51d2a07bb7d08016961d6d93d2
-
SHA256
4d26234969a4111dc239fcf295cbd82ca5cd24fab6f419a88d5de84f10934313
-
SHA512
a32b6ff53a127db7cc453b93aedb402cffc4e89f26ac8791b1e8cb139f21cd76f4595e94a4373ff737bcec831086265c69aa0b49e95f80701ca84705c12ba98f
-
SSDEEP
1536:bBklcWklcaklc7uG/bI+3SkcXklcPEijZeqhREijZeqL8QM+Lb8HZ2f2ZbjRNNu7:bBklcWklcaklc7uG/bI+3SkcXklcPEiZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4076 msedge.exe 4076 msedge.exe 1280 msedge.exe 1280 msedge.exe 2300 identity_helper.exe 2300 identity_helper.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1280 wrote to memory of 4592 1280 msedge.exe 82 PID 1280 wrote to memory of 4592 1280 msedge.exe 82 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 3312 1280 msedge.exe 83 PID 1280 wrote to memory of 4076 1280 msedge.exe 84 PID 1280 wrote to memory of 4076 1280 msedge.exe 84 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85 PID 1280 wrote to memory of 4540 1280 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\341f98cea346983dfefe6dc5970efb3d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe0d6b46f8,0x7ffe0d6b4708,0x7ffe0d6b47182⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:82⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,1978505667926276479,2710413670762323867,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5420 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
Filesize
21KB
MD5549baced2c151db8a02c3419aa5c01be
SHA11f36a9716da201c5e45c1cc23c349bbaae44a3c9
SHA25611938f83bd463e29316808f3e118440f718f1c7a0761bc860171255a96cbefca
SHA51212c40a66af58d9436d7c3361de906077402cfeded97361c81d9900d69d405b5ab002ac36aad3f8152c6083e00755442bd1bcd1766af26c097638051dfe1aa9d0
-
Filesize
45KB
MD594019c00785285cd78d6da8a1bdeaf80
SHA133ba11bbe8c91eca17a84c3dcae4667638a61b57
SHA2562ea5a487d117c082ab04c8b2d979adc04c18f496af90ef2caf9910d9902ef8a9
SHA512b58d23d9333290e203ee3191cbcca4686ae1f9b4c135ee8a8e0f014e7db4efdcffe6aa82b502b2d8e63bde705895a04726d799a4c6b0e22783b6925b4d297d70
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5c4f4e1dd5ae48956e3081a919c3082ed
SHA17bb5bcd82be49f7afe47a2ade1650a0f7c1cc21a
SHA256e2ccbd54af616a3923e6919391ae17980f5ef37c9ee03e1a722d645ba19f5a3b
SHA512f003d9fe1b9ec0ba919e618ad89b527069ea358cde9759bbddf27f542628d704c2659d071f5e760e746c1f3c114d9f3e29473eface06fd3558dcc63e7da0119e
-
Filesize
1KB
MD5feb1e4254790ff197c5c5cf7188174eb
SHA1d5212320a83d76c24b033987eccc86ad30eb9fcb
SHA25615e8e37ce88478eee48927ca0e50257eba5ab20455714939401e217195e5aa20
SHA5124ddb0506b08f4c87dbf488fe8741d8c74cdc2e567f42fc2b1db1ec9770ff7464a16a6c30d6cadd753f32c2bd6c115b11069496e8657f9f1a57c658f32927f5bf
-
Filesize
6KB
MD5de38ea864ab2facf9a8a7a44654c9fcd
SHA13207515bcde3ec7cad4cc3c2dffed97f6411cf10
SHA2560ebff518c2c9ae2786337b321311247b96d4faa275325d780ad9c6160b76b69f
SHA512efd91f03a780d15b13f8e738a077828e1430861fc88998417ff003e6c446ddb291df74ffb5953eb8bccfdd56947a590f597454e2365440a1414b190221eccfe9
-
Filesize
6KB
MD55744ba7a1ade3aefe011331faf6be8e4
SHA1dbe79da50f507a4da4cda13baf2114df21837a37
SHA2569ec673ed39a28935af85ea5bdabfc702390e56fee070c6725f12376940baf377
SHA512d59ed671455ff2a00ca0eafd44264b36cfccc04d006b2de7afbb78e3ff2a27103c51fb3dd9c24da6905c6878b7a43c474e881f9df4c448e33000f07531c613cd
-
Filesize
6KB
MD57967e3035c2372b9034caccb99c21401
SHA1b188851fcaeed27dac42e3a53ec54741f6fa98fe
SHA256f73940f834ce8fc0f07da863ca2cad3b76569205f8c7cd58c95db9d5fda67728
SHA5123e0fce27b4d9503788ac5b881021b521c8316b91c9333d07922baaeb208421ceaae6faa0c5a4d2657b5759a53f10575859550e4ec4cad6c169eaa47c3978b4a9
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5d7a90872a481dc0291ce769b766d4a60
SHA14583177ebe1ce073f7da75a7a6123d0acb539f7b
SHA256bf9d740e83614e25ecbd1523dde2abeb196e91054882d373577db65b962c2e16
SHA51203d9e98f41e18001b22d4e9a8d7e48d19ce6aeed572154901f8a04c5fc3f48ca93b0b4998896056cf37e696e57dd96daa59a83855158b3b0e666a3eaffda6e60