Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
54b45084b6a8ff4661f3f59125de0d41_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54b45084b6a8ff4661f3f59125de0d41_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
54b45084b6a8ff4661f3f59125de0d41_JaffaCakes118.html
-
Size
53KB
-
MD5
54b45084b6a8ff4661f3f59125de0d41
-
SHA1
b4efd6462e48f65c3f2dcdb8dce4b06c3bae434b
-
SHA256
fb0e19d77db987690781eb46fa24197b2901bb3bfba1577dbc89f91136ce59a2
-
SHA512
502935b62cebb56e45e17277d61a960d3e93f8124262eb64390a8582218c67eb8fca816b556e56fc2cc04ecd4ff2edde0f5380bc56aee0cba72494559779a9ad
-
SSDEEP
768:/pjrfP7bi4eUqURusKHy8ZBzXXx2VXWFbCiHF6HABsjeIQy978HexsXa6GvJYNoG:ha5EWFbCiHFdIQy978Hm8aRaCKKlO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 2896 msedge.exe 2896 msedge.exe 868 identity_helper.exe 868 identity_helper.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2968 2896 msedge.exe 84 PID 2896 wrote to memory of 2968 2896 msedge.exe 84 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 4952 2896 msedge.exe 85 PID 2896 wrote to memory of 3304 2896 msedge.exe 86 PID 2896 wrote to memory of 3304 2896 msedge.exe 86 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87 PID 2896 wrote to memory of 1548 2896 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\54b45084b6a8ff4661f3f59125de0d41_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff952c546f8,0x7ff952c54708,0x7ff952c547182⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6624 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6292 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6320 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,4152081026060737163,13608194089419162159,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5d811e0453c5ef4cc51517162c7e1e565
SHA1c83b00d444e7e3747a2be16d4bc192d44f1a9c1f
SHA256a566177f3cc68e121c3d0e8b7293faa21947c971500f9817b6b7c559b9968d66
SHA512fb0f628960b5f4c0a2a0a9485ab9088261079612fc3105b6698fff8863c6831f2e8466355db9907ec90e6d5d65639048d36b59e48b90acf39154c1bf30d0a37a
-
Filesize
2KB
MD541a00c8c3d23c241dd208574e17fc2e7
SHA1d010dc73e143754bd4889ac32c7ad048f1236694
SHA25653fd6180eb5383479b0f1548c41a4948435cb9db5bf821a6e897b0677e1e8343
SHA512bfb152937d0f448f104d36541e9ea709fbcaa967a972fd83aad9eea246cac5ed9985a34485e5dc81d01f5f0a0a5de30e1c69265dc07b0779a2d0d42178d7c050
-
Filesize
5KB
MD5392c1a2a75132de17234b418eabc86be
SHA108e83e0c15c9834ecb30357ea1bbd6349105e552
SHA25603c01ca6f3aca1f8a0c8e42037d2d55e55f1b6467f228fc7020a7a8f069d83f8
SHA512b30f1ce9b003c9ae9d9d5639c8ffb2ac25857acd40036fc7bfa0e03d9fb6049cb80371aeeb705481d5a439355d80d4d14fa024a4cfa6f5c2b67ff5279c09d952
-
Filesize
7KB
MD5655648b5746a0a6dd5250f8a0295f4ab
SHA1cc2c748b552083c37af714a23c0cdd9a15682bed
SHA2567de9bba7daa4aeb66946ad9534ec6a9f11bf113e572cadb76f63663b515e5e15
SHA512d8d2107db0f13ca0ecfba11ed3e802d83d925a9359a8f607cb0695cf030dc56495c35ad7073a765ad92363b719ebb317bef55a45d766d0226b0373b55c463d6f
-
Filesize
6KB
MD5309f256e0a69eb9ffccd7fea26eeab17
SHA15865923b333f134c0a37250a18882f85782bc0c0
SHA25631a0bbbde10ca40800c4f4070822e4f41ce5c554deaeaef94adac19cb3e56c47
SHA512e7ddd34a6d18843b3b301274ed0a800a708d0cbd6ce8a5598ed60f6a6aaeee1ceccd6dacbdfd1a70a0a4fc504f7414301bddfebd0f30a9dff74a9e23414bd67e
-
Filesize
874B
MD5904dd68657f552bae138c62b9d821191
SHA19273cdeec609663b16b2b67623a35b0c07c4764c
SHA256418f22472c9b1018c77be95f7d6ff31c7455c1dc539e5e77013037832897b374
SHA512cc3b68932c69eb38d1b681f1796c1c04ea44e3140113900398024b6513b0e059ab8f9e1ea009ca9eb56df52fac6e6eaf89d327a12602cab28270fd0d15237796
-
Filesize
539B
MD57c09d074c6ba8e7cd2ee58315e1a4090
SHA10737574b50e392d7005fdb47275c6edabc575300
SHA256a2a6d077642c852d7c38f61ef301033639ec4e882d3e5daf704f3b8bdd663d16
SHA5125cf9f1ddc464c6fe8ff7d2ddf3de5dfebc891b36ff3d40aa4dc1f8190bcee5faa69c27e8efca61d8d56318ec86fca8f97705112ed806366a3725ae4e2efb57e9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50bbe946f32672cb8eee2ecb7a10728aa
SHA1e1f96c32fa9d96c68e819fde5c2ef83cb6a39f7d
SHA2566c147694ec179d5baeeb1df9806040f88b838b075508d104582631a305cb0ed7
SHA51252e6527fad4d6080019c668ee2403efd77ebb74d77ebb871162b07aeded17eef0746ae9f09cfb3cf30d63b418b24adbb09b8f7d864d6319f74b54dbab2aeabf0