Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
3eaa82892ac800ac413701a6d6b067e0_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3eaa82892ac800ac413701a6d6b067e0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3eaa82892ac800ac413701a6d6b067e0_JaffaCakes118.html
-
Size
121KB
-
MD5
3eaa82892ac800ac413701a6d6b067e0
-
SHA1
5e8b6f161a2fd2f5d74cc535642cc0409c17c421
-
SHA256
990ff8c83f611266558f8729aaee8225938cfb39ee33a81cd1d1dd210237fc5c
-
SHA512
745bfd7c2efbd39fc1add2abad4023c9e0ae48663ffa82ede1293a193a2f78185d96305d12e5646e9ed17d47dd6f2301568a5892eadca2e215c10f6df4b39f36
-
SSDEEP
1536:P6SYt+I31ttU4BSMl44x5HOkltJ+mOPc2nvDKyfVEZdAyfrB+Bi/40MLv1D6lf3+:P6SY1HcUhUzhbIh1/rWHQ4G/+aGVIK/T
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 1288 msedge.exe 1288 msedge.exe 2916 identity_helper.exe 2916 identity_helper.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1288 wrote to memory of 4988 1288 msedge.exe 83 PID 1288 wrote to memory of 4988 1288 msedge.exe 83 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 2984 1288 msedge.exe 84 PID 1288 wrote to memory of 3668 1288 msedge.exe 85 PID 1288 wrote to memory of 3668 1288 msedge.exe 85 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86 PID 1288 wrote to memory of 4788 1288 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3eaa82892ac800ac413701a6d6b067e0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbfc6746f8,0x7ffbfc674708,0x7ffbfc6747182⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1928 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3756 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15355079378150425731,7090132572814037315,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
390B
MD5eb62051ac3a853d7b12abc20436dc275
SHA1b989d9b80912132c27bd6c9505c43da60156a0d7
SHA2564a4d9d51977f4bc08237449bbce2fc07a84645519b91086164ce1a2a4e9fd1a6
SHA5121a1f49fc167ade7c57ae56178ea0069a96ffaf8e1c413f30c3760a9d963aa9217097992aba76a0ea5cc9f4bfa5f4c7200405b6044b08344f70368d79508e73f0
-
Filesize
316B
MD5843bb3dea3c2c3a091da8221a5bc35c7
SHA154e739dec2c8b20c3460ee83c44f1e24abbc7d75
SHA256e3b49c8824a26eaae9e5ebaaa9f503545970ba6f3b5189ab13a65732cd61008e
SHA5122f9999fec7dd9b6d30f183b3a82236dcacf053d51c8141ea9110d071ec2981a42e467e3f770349e37138680a860346b10cd449342e6622be3046b1ef7c54c658
-
Filesize
6KB
MD58d5102ae669ba4e631c08bd1fa53fe9d
SHA10988d9b04fc40618095c8aeee107f8d7f02a2736
SHA256178b7d03278c5c4140b0650966e740e0512b5d4b1ba423795fcadaa4aeac9bb4
SHA512ce6e2f576bc44d1d36007295ee092e1e37d888b100030d7eddb18f6f5a22dcb551d2f1dfe5d6f23ec0875d25254b300b2e2f6ad74433addfec57f1adf46319ba
-
Filesize
6KB
MD56ed3d6ac3a6c1f5258522d20e0349840
SHA13162921fc61808880a7e9d43b817539208a19428
SHA256c49fcce0d1eae652807ed4be28b1abf53c430bb675c06d29ccf0d5c72acb4d55
SHA51209e171dd7fa5ecd2dcc349e2a84ddf9a5c54374bbc46f05e94225af98f5a20ac93d733de15ccf8574f639ee8173baf41fc0ad162199465612c679fc73a290f6b
-
Filesize
6KB
MD5d42688cc6dca682b8a24d0667905bd50
SHA1737221499aa6bc658f653a9d3b4c2130807889cf
SHA25641339a11cf65be3d59c548ddec4189c69a0fbc2670e19b75a60f37254576fd41
SHA51203e6368248c5ca88d150d942c8dd0a1100bcba3729c53633579ebb418c3d296bd4a734a4f7497cd0c8cc0cda2f53906eb34b4234b676913c83c633f35b79bf11
-
Filesize
204B
MD566c3cb986198c2eddaf4ece612670325
SHA17cbd472ad6768be58379f143f27efdaa24f59b84
SHA25635a5441e40278c5afb8a1a4890c72cdb81553113bc2ae3600c501b461e8e3bb7
SHA5124f146c799372b453308213cb2730545d85b9f0df8225898573099f278c567599d33e463df5c4e5238493207cf1eee71ed6ef4e5d5f814d15817e70623883580f
-
Filesize
204B
MD56cca9cb27a3955f7fe1b8f43dd23d643
SHA1549fe136f7d6c9e56ee278a75301099c12a968fb
SHA2561f195d253a58a2c7eba4f12d0a775f1686883baad7d5b1e4d96e50e0567e6c95
SHA512494ec2e13a3d9c5c82aa7a8ae72b7cf5d6ef39a0c3b80107cde41f8ffbfa69f1295e4a57c9744d2782b18e1b7c3f351fe2874b66b7f59ed48012631a5bfefe9e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD59a4188c48e353713242d4af673aa48b2
SHA1b678e76f71803af35a90f94b57ef757884925490
SHA256aa01f9ea10e6e4b3191904777f6a701260d7c28cb0b9e1feb3d4a927d3d38d1d
SHA5125271ddfc8a01d3451cc7207be04767784ed171c22c47f03ba8edae1ddc8d639df0e89d80ade4ddf0c3b3301e7fc7b8d19111583acc1befce56de2f17cb9bd086