Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
ea935b853d6ed68a77d93b1a7d3ee458_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea935b853d6ed68a77d93b1a7d3ee458_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea935b853d6ed68a77d93b1a7d3ee458_JaffaCakes118.html
-
Size
106KB
-
MD5
ea935b853d6ed68a77d93b1a7d3ee458
-
SHA1
3e60705245e194d75fffc18ee0e38f757805f276
-
SHA256
48306b7518b8887f3c2151fb1690987e0531f5a9eb7e27903797be9e55389ff8
-
SHA512
fd8af7df4663a34b8be60917e1a17cc4de3f3d3faf375fbe061ea12553d8581d8a1c9242b6db99148289ab1f2482989f4c066c0dce67b05ae753da5c82c86895
-
SSDEEP
768:i+JEX3C/OamdwufDnDD9BVZfkHHjKE2ARCKTpfF7wsB+w+iy/:i+JEnCjanDD9BVZfkja5Klf5wrw+i6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4116 msedge.exe 4116 msedge.exe 4664 msedge.exe 4664 msedge.exe 2156 identity_helper.exe 2156 identity_helper.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4664 wrote to memory of 3740 4664 msedge.exe 82 PID 4664 wrote to memory of 3740 4664 msedge.exe 82 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4784 4664 msedge.exe 83 PID 4664 wrote to memory of 4116 4664 msedge.exe 84 PID 4664 wrote to memory of 4116 4664 msedge.exe 84 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85 PID 4664 wrote to memory of 2384 4664 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea935b853d6ed68a77d93b1a7d3ee458_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83db846f8,0x7ff83db84708,0x7ff83db847182⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2316 /prefetch:82⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6696 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6680 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6692 /prefetch:82⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,11463617768103394878,14393170702824407252,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD52eb7a0677ce485765743cd612ae88403
SHA1a74f4af80a18598d12e5d6774e2ded07ebd87456
SHA256b51096b907fb84e53913e196ac8a0366a7141a3eb025e66ab11157235dedc715
SHA512ee31c96041ecbe1988d6a869c51a3fab6b53868428df4ed590f36ed0683ed0837cc53c724270bbc3c46769381d9a02e647f4f4de79c804c9300fa961364770a9
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5d56be75054b1dc093aefb43c52cc6398
SHA1befcc55db088a3ccb96c9767c6e959dcaac3fc84
SHA2561621edb035f4a0dde445ac57c0dc698214db6347d2fd7c2c91ec7e854974e646
SHA51254a29fde26007c80f9a553f940d34c3bc6b8f1ccf669a13412bccc0b733da7853302963528865555fa433fb208bf357971c6316ee77ec84abd18f1e91e9f8117
-
Filesize
1KB
MD55a67b3871ae42aa8402f0e9cd9fd87cf
SHA1aa38d7f1db723eb953e74c9e8d07075bc301ab5b
SHA2561ddd87bbe25f91be4f9e923aa97b5581e639ee92f9a08b982401d92f6a0d59ed
SHA5123a545c9e4614bb96dedd14618894685314b96641b29f60d911d7fd4e2f29c7cdc3d3b3303c132748ffce8a80957809994ab1b2c1e940cb7d7ac77fb813281bfd
-
Filesize
1KB
MD54eeca12240b9915c948a8e3fcb00d451
SHA1c4f09ec63c1401c77137e48fd74bea0ae9b502ba
SHA256ec8d574d0b3f8115c51f85ead79dde9aedff6fb3514a02fd60dcbce993b63074
SHA512477c7e5569ab4fd350932e1dac7b769b80316c871d13d5126a82cbc4d314156b1e7c4b17d452ecb83c2eee5dd0c4fd53686ba15c683c8f6ed7144504ca1fe9a9
-
Filesize
5KB
MD52009582481295d6940da6904047c38fc
SHA1d89eeaa3d17df19e0709d964482165c5c8c57cb9
SHA256aaf4a1e8a7e722aced8fa90a38fc1c3554e7c40c72cc92ec5de33fdd28b595f2
SHA512ad2cee2d6aad674fbd0e2714f8b1fbfe66433e2126a02d78bd487ba04ef80d63f42b9dfd5aea19989f904acc6f5cea5325582620a352b0b24b08a063649e6873
-
Filesize
6KB
MD562daf094ec8fd67112caa5a720d088d1
SHA154823f9ee94b3401118cf3e68ecc8a2b4db97120
SHA256a9d3ddcc05e2ba4475e62be53b5a7fe93ef7fc9c54ba2a1e8dfa8a86f525969b
SHA512e5b4a3bdc21d2207e7a07af731e4f2b17b1f6c3c225aa48b01a385d95a533cfc0f6a3435ac0ddfa0402d9d98f096e06f3e19a0187967c5afddba931d2848aed4
-
Filesize
7KB
MD5454b53dfd717fabaf4c74fd67d43e17a
SHA1b8bbe05cce28a8cd6fa0cc5fbeea0ebdb61aa219
SHA256bf12d70e7eba7b9902b62b3faf7bcb2b0807fa96ac9b992d1fbafdf99263330e
SHA512c1b0b6857b1383eb91e394b4aef7bed0810997f1d5bb777fd624e6618a45554e85c3385bc1f4cb5b2f3625ff8b92ec8a18a840d236cd9e64960d62132b3e1197
-
Filesize
874B
MD5fcfac8cc3c9bf0a15fbec921f9c051da
SHA1b28537767eb0363ef81be1411fa1046fd4a49a41
SHA256cabcd0f81e9adc925a56e7af7051395d4ba4c49de4385b71dd6f4a756cd4f7f8
SHA51299770124cbb837f8b855e6e6bbaf238dab93c90f596f1960d992bebb6c90a0fd3064a022a31e5596c8a480271af4df909edb627503525b4c25f6d50fddf4d19c
-
Filesize
706B
MD5e35b95c28a11f1e586b53902bd2c9f85
SHA11f912237c159e05cfa09cec9e509667834d0be5a
SHA2562d315fd4978fe41bf2fad39f22cf021e276c291966508b61821390e2a4b2d94f
SHA5122cd417c776e2f6159e599ccd470986c291d22f4c32bd238661b737e07874c1577582dc1591966f7606a454b49c0fdba9f621d808a43849d857050923ac78d303
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389