Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
575c861d8783c3fc5d8803e5281cacf8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
575c861d8783c3fc5d8803e5281cacf8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
575c861d8783c3fc5d8803e5281cacf8_JaffaCakes118.html
-
Size
432B
-
MD5
575c861d8783c3fc5d8803e5281cacf8
-
SHA1
4fd2f99c190cf2f0732040e47f453f330f572eb7
-
SHA256
7722014b8d62bb7f01e419daf2108b8b2631e11abd5365f58f1dd44d2fcee400
-
SHA512
4d6f4e6ca8236b7f5b5dbbc870380b56ae001addd14d49b388193aeea965a650b7d51d8afcf4b1d7ec620e65498a0db31cd1ef710bb31e4857aaf743179ad0b2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 4468 msedge.exe 4468 msedge.exe 1168 identity_helper.exe 1168 identity_helper.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 3244 4468 msedge.exe 85 PID 4468 wrote to memory of 3244 4468 msedge.exe 85 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 2020 4468 msedge.exe 86 PID 4468 wrote to memory of 1984 4468 msedge.exe 87 PID 4468 wrote to memory of 1984 4468 msedge.exe 87 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88 PID 4468 wrote to memory of 4936 4468 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\575c861d8783c3fc5d8803e5281cacf8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9970546f8,0x7ff997054708,0x7ff9970547182⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2408 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,7346723986895161380,5966259055706741823,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
348B
MD59d5224eab003381869430d4a1e531da8
SHA1ec842ceffd7a108e626768047318db98a0e7161a
SHA256e6936fc6882cb015f53ad7af9487ea1ca9456a1f7fab9c8905507d8f98b02652
SHA5123c12d059d8273ded1d81b435b9a1cb9d7b3494f5ca8cae0f46d22a76be974f2c966de50a533fac716804948acdee4c73717e29507475fbfd3034c32d7cc34be7
-
Filesize
5KB
MD51015d7bd1ab69be377b01a67274b0c62
SHA15f27b561773c697b00c375aac5df1ca317f72f2b
SHA2560763b3ab2b77a3873b90caf5a75fb2fe58b3e8d79bafc41d94df9c2c8f57a176
SHA51218ea3181508d60f41e8df1b0b2d276cd99539bc94dc49bf5b6629c6c87c74d4f2fdf021aee35d0c3726e84a727742bba1896027601b36a3e3c72089151d0e610
-
Filesize
7KB
MD533ad74314ed3d08aafc7458323ac2581
SHA1827f42c7846524615a1555989679fc5896f56138
SHA25642029824a340e49f605f8cae230756f0359e1775e4e65ee58c9de579706c2463
SHA512cfde91cdcadfeb1f25206e30ecc98eb34efb30c5d90777f6849e61f3fdc5f297531bbe2243882cb082cbbd85d9acfb25edcdfe9ea74b00e2cb3e9a2501902ce6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD506d0a364296b5fa3ae2f9337e55e426b
SHA162116e2708f484d37f7b56197202ca09d9ae34ee
SHA2565ea912f548306f05e15155f5af47e1a7d65faf5f2b6299524b8db0e8df395646
SHA5125c197911abe6b536a0b226bfb95b1654f0073fd6eb31c84e151718180162e27631a4d495ec97c83cbc9064602483cffc33900bb5feaaa7589014c9e29f25f1d2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58075e.TMP
Filesize48B
MD56732a69399df475bc85721eab696a1f4
SHA162c41c911a162b4f8358783f6a86463697fbe908
SHA256e7d22aa9bf163e7431da6d784ea7f3819995507dcb6d7880db71d3e2188d2460
SHA512cd4b24f50eda6daf4f39302e964014426eacc5366e7e032147308f8bfc5a49c4c84ce949d17100312564303c0ffde3448ddd9f218f8cd8469fd25bd925fb750f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5303e5275c1fb01c13116071c85f0673e
SHA192e196c986b32dbf3e1b0f5128c2deb365b91a66
SHA256db1528a4954b6535caf15498824b1221fb5be850ba5a9e8b7997f769bed232a5
SHA512c7e6550e6784e0aa2a556d98ed74c2ea4784a1cfbd85e556a0c52f6925bed218901e346f837cccd159f94621c7a7ad76b8fd4c150fa7ab0b9b11f58f83c3d630
-
Filesize
11KB
MD52597976288f4fc8732609fb0c2155dbb
SHA195d29099b24efeac60bd48eea5789d30ce28cabc
SHA2564e8bc25aa4daf23a138f4844a4918bd9d27982cda2f8168cdd5671c6cf7da9c1
SHA512b8f7cd434cf05431135bce7563f0ede23605c4cd83e50d52dd069e054a61529c58066d56794692874e890e9bcb853a13cf87ce24cc3720e8bd5367811aa87470