Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
105a64c7a12928ec3e7e073cdb30a9eb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
105a64c7a12928ec3e7e073cdb30a9eb_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
105a64c7a12928ec3e7e073cdb30a9eb_JaffaCakes118.html
-
Size
140KB
-
MD5
105a64c7a12928ec3e7e073cdb30a9eb
-
SHA1
c0ce2c49ca88546edae8adc17e4f7475c13e9180
-
SHA256
6628ee83a2e602b456e3c73245552bf5b2aec8b4c1e81dc6d174a5bd7569281a
-
SHA512
15b1e3551354e91757139b3195b657bf771e9f4f3245c9c4a6e2a4567ebe75df80b2190dedb24d7d63aa1a91bd749aedc995fee6ef6dcb7a141d9c7b005a7d7f
-
SSDEEP
3072:CxUcjvG8rMUcXmNRS7S2wMSDhy9nZ2ldAkO2Kvv4lM:qGXmNRZ+
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 28 sites.google.com 29 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 2004 msedge.exe 2004 msedge.exe 4664 identity_helper.exe 4664 identity_helper.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 60 2004 msedge.exe 83 PID 2004 wrote to memory of 60 2004 msedge.exe 83 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 2464 2004 msedge.exe 84 PID 2004 wrote to memory of 3268 2004 msedge.exe 85 PID 2004 wrote to memory of 3268 2004 msedge.exe 85 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86 PID 2004 wrote to memory of 3716 2004 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\105a64c7a12928ec3e7e073cdb30a9eb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbf9b46f8,0x7ffdbf9b4708,0x7ffdbf9b47182⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,4293959718173958350,17388606262573245171,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,4293959718173958350,17388606262573245171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,4293959718173958350,17388606262573245171,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 /prefetch:82⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4293959718173958350,17388606262573245171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4293959718173958350,17388606262573245171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4293959718173958350,17388606262573245171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4293959718173958350,17388606262573245171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,4293959718173958350,17388606262573245171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:82⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,4293959718173958350,17388606262573245171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4293959718173958350,17388606262573245171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4293959718173958350,17388606262573245171,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4293959718173958350,17388606262573245171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4293959718173958350,17388606262573245171,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,4293959718173958350,17388606262573245171,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59dc60aef38e7832217e7fa02d6f0d9f6
SHA14f8539dc7d5739b36fe976a932338f459d066db6
SHA2568a0ee0b6fafabb256571b691c2faf77c7244945faa749c72124d5eb43a197a32
SHA51218371541811910992c2b84a8eae7e997e8627640bdb60b9e82751389e50931db9b3e206d31f4d9d2dc3ca25ea3a82c0be413ecb0ef3ac227a14e54f406eaa7e7
-
Filesize
152B
MD57ac03b15b68af2d5cb5c8063057cc83e
SHA19b2d4db737f57322ff5c4bbddd765b3177f930ab
SHA256b90d7596301470b389842eecb46bd3a8e614260b0d374d5c35a36afb9c71a700
SHA512a5e9f40dd9040803046b0218fab6b058d49e5e2a3ada315e161fe9fc80ebb8d6d4442ccc1c98d19e561fc7c61bcf43d662fe2231cacacb447876a2113c2e3732
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8e67c16f-8513-4b9a-a0e5-5538e0b5261a.tmp
Filesize7KB
MD55d87500904cbe78d322e7bd30dea3f96
SHA17260cbbc0a2a0df8d8ef0ec17e53b3cde39bbf88
SHA256b896e1e54cc26d9c9f4ce8d6a1813cf79a4565e7a532482fc6304ce10312b2b2
SHA51241e9b01c92d75c343c0940cbaf951360cfdea4d64385b4050570cff01c2dd3074a8c76199a2da9e47d7f95adbf601bc949058f527141f373bb2579c6af3fda72
-
Filesize
40KB
MD55ce7bdeeea547dc5e395554f1de0b179
SHA13dba53fa4da7c828a468d17abc09b265b664078a
SHA256675cd5fdfe3c14504b7af2d1012c921ab0b5af2ab93bf4dfbfe6505cae8b79a9
SHA5120bf3e39c11cfefbd4de7ec60f2adaacfba14eac0a4bf8e4d2bc80c4cf1e9d173035c068d8488436c4cf9840ae5c7cfccbefddf9d184e60cab78d1043dc3b9c4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5c44bace73105efe6326eb9e66b14956f
SHA1d239810e5596318bf7b29cfef138416a09f17e50
SHA256d60973f8c85f8d407d1d0424b39665cef1e57f50918d968c7503c8011d3dcf7c
SHA512bd517c7e7ac80088cab5024e382b2d2ec29784f0b6987d5a35660f19095b5d4b3f93b5ffa6ef16c774e6a2c939bbf5ba16434c3001e692f40254745ada8d5622
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5b37629375b5cef89593ceda97a56027e
SHA169734e5116b8209fbc9bce44c8d54e1967c23a08
SHA2560a8262e90f0ca190de6321e24b6bc7aa09302f919a7b8ffcbbd0a38e54b6bd91
SHA512af54d3278bb6e0c87a11b1d0513fc1ad39de834c5db7c6aa4e50490e63b33632332f2fcb8973be3dbf712cbe2b0a7645aeaeaa0dd9b2504bea75ae107cadc8eb
-
Filesize
2KB
MD58be6e2c4777a8110491a21795c1dce47
SHA1aca8d6ba715548813d0a5c29b29e79bf1dd5e404
SHA2564b398e9daa209eb6a018441e452961332897f9c908d3cb47bc1966bd4887a22b
SHA512ade56ed1972ce0afbe5be33be91e092069ab1cc03363ab99fd23ab6d0556afde2ba5b675197f13031ae51091fb06843fa05ac591e60a54af7d6b34d07d764cdc
-
Filesize
5KB
MD589da466d398c06a353ee26409a7fdcf4
SHA1a41426cdc5496b85e385cb8bfea15c425381e411
SHA256dde45468771653ca333f5534718daf3e6459ef62762095f6167fa5e9c15bb199
SHA512125a3c57e8605c4b9ebcb1104dad2e7ab16a0f5d2f3e11148e4afb57aa7744cebf7a51d17ad362fd4368940736d92492369060de61c6ea3d3244088292ee6eca
-
Filesize
7KB
MD5cc1f79fe1cfef65f56c1f195b39e7f31
SHA11ddd964d9ce5bb1fcd6616b3380fc54644cceaec
SHA25681509f6f69fffeea4979d5125a965b287a8b95e9a1391294f7c33d815e7dd5d9
SHA5129d1cd4264faa7fa0e620803fc4ebedd07a40371e4963c9312aa757e70cb158a1a9710617cca325e99c1adc3e132fa5a5aef71e36b7d4afa3fd4ca318b0295e42
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e83689b8-6eb0-483c-a11a-3be09ec067d8.tmp
Filesize7KB
MD5a6eb2d56719cb5e94d9b96936029f191
SHA1878cac6645076845ca03538a00150a57379f0da4
SHA25667b9aba2807619dfbc676c70047c0e90201ba04d80633ca33151b2fee0b3166f
SHA512aa40d85072b38b229afb10f82bb840a376b1915e444ce66918897002e6f71df5a9d95f21c2dbafe6571376f015da4b5bd2051aa6518e43990d545cee2e25b077
-
Filesize
11KB
MD50822f44a9fac5ba40367c1cba8b98045
SHA12f17d737632291b4831e1fe1568fadf85a990ded
SHA2562349ee620094ef932d11bea113b5ffbf5b8210a998e5bd7a847e81e8c3e1bd74
SHA512d7ca6df87e903ba4d75353625913b01775fd52025d458cb313339e9eea90097a61d058c5dfd7b2dae528f3d509dfe312ff3cb3681f74d6b6138f461552de36dc