Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
3a69ad06c8d50a2fef48f8a29ba06562_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3a69ad06c8d50a2fef48f8a29ba06562_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3a69ad06c8d50a2fef48f8a29ba06562_JaffaCakes118.html
-
Size
57KB
-
MD5
3a69ad06c8d50a2fef48f8a29ba06562
-
SHA1
cd04b143dd3218a52ebae4b65db5ec84342d3526
-
SHA256
175295f0581526c7f32434c1be6500947adfdad1a006cbce97f276b9c283921e
-
SHA512
a1814e70869cf6dd31034dfcb57b08949ed8bca037e34e9ae7ecfecaaeb9108acd4935865e7f73771b9e7279b3ddd0cea8261f6530ed2eee673a36b21058bbbe
-
SSDEEP
1536:ijEQvK8OPHdsAjo2vgyHJv0owbd6zKD6CDK2RVroj3wpDK2RVy:ijnOPHdsj2vgyHJutDK2RVroj3wpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2396 msedge.exe 2396 msedge.exe 1528 msedge.exe 1528 msedge.exe 1724 identity_helper.exe 1724 identity_helper.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1528 wrote to memory of 628 1528 msedge.exe 83 PID 1528 wrote to memory of 628 1528 msedge.exe 83 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 1908 1528 msedge.exe 84 PID 1528 wrote to memory of 2396 1528 msedge.exe 85 PID 1528 wrote to memory of 2396 1528 msedge.exe 85 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86 PID 1528 wrote to memory of 1472 1528 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3a69ad06c8d50a2fef48f8a29ba06562_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe409a46f8,0x7ffe409a4708,0x7ffe409a47182⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7124 /prefetch:82⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6176 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,202275286841484108,5674981676313067583,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD5654f2f70754621746b96d413d75a14cd
SHA118d393605a57720dc6e14cb99af5179182075977
SHA2567f74a1d03a52af764b5b94af499cad45cec384b6d9cef0b9231edaa091f053dc
SHA512d3a8f09eae7f7730ed4aebd98cae01cfd5f6e805cac30d07559c0c734b43f248c9e91f16d3314acd3ed9da448661be33965a827efaeb571fff1e286f2b5154ab
-
Filesize
1KB
MD5e4a0418b477c8b76004ad78df07ab8a6
SHA19687086985a9906d29a466e5539d77c1a1b04137
SHA25633b5db648f214dd360020d18fb29acc610bd476b600e63bd841999c9908ea788
SHA512655a9b14fc36e844185b64b66e66fadf5413e720d829fa88069239a188bf198bc44bc1e2e7fb0848a815bd78fb6eb5638e676a2d813ac205a14e6fa12d52a2ca
-
Filesize
6KB
MD5d9b882e5a2f342994ad86dba3ab7d28e
SHA1d81ba3252c5be339bfa5ef43a60f65a0b79d84b6
SHA25628e9bab1a5cc5257a4075ca681d2664d4d5e519cf96426be27c691c1d58ef8e6
SHA5127156728bf93a5425accc30a6a3a3d1a24d65bdf49f88c9060692e2f261c396c4c72e7a648026985a4704be4c1bdb51deb0192183ca85815a62265378fe2a3a1b
-
Filesize
6KB
MD5a017046882b219f6a36cc338dace9f1b
SHA1163792d1e9e28fb6223ae08a6b73ada4831dcafa
SHA256129130f106457e6f9096fd0a2e84399d7d9539c392f059729d85b340340ea6f8
SHA512d66e5fea8de1174a7f5a4d1981032f963cccc6fd7e3a5f798e2440ead00762fb9a7a13edc1baa996f70e0d230fe6ba4dbdad33accbe82409715c6c8ff46b742f
-
Filesize
871B
MD59ade9e01600dfb5a18e917eca356777a
SHA12d8509766e361f447051a2bf58a1ac0e86ab1158
SHA2561a27e4e4d4bf4719b7191a105e9c462d53ac65e3399102454ea296d613f8da6b
SHA512386caac614158ee114089e1a545cde6ca7e1e68ee8df89fb82eeeb5bd6c7b1188b4cc497bca2e0224314f2453ea5f0301278ce6bfde1e8640ee6e4e02fd45e32
-
Filesize
871B
MD50b5e08df143f449d38387027db0f423e
SHA1323d0b664dcf88c2c9907e7658c4e1f186f3bc80
SHA2562ed14b712124885304e90484a50667a8ba0c75d0c3a5f99a7fc35a48859a9ee6
SHA5128cfbb2f89d0fbd0a62bae2b309ffd7eceb9d83c0e40b610db875d0135c04b9f78497478b5e2f043ae63232840b3103a65600bda01378fe3509f5d5fa9ac7867f
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD58c2f7bd69ecd4e0c93d5f83ca4fc234e
SHA157f96c157dec63d06d90c13a8347d5147ce7d0a3
SHA25620708b4cd3dccbbcc79a92ad29f39889235e5cd9b4c736672689332d24a149f8
SHA512f5c96bff53fc3000fa51cdc5029e6917e734a45863bd3aabed570060ca202503fbe86ca5a9d32b841cc121cd5368cabd8af95bf8076e8e5f8afb7f3b0c189a9b