Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
fe994b0c5675faa1ed33aa65c7690bfb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe994b0c5675faa1ed33aa65c7690bfb_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fe994b0c5675faa1ed33aa65c7690bfb_JaffaCakes118.html
-
Size
893B
-
MD5
fe994b0c5675faa1ed33aa65c7690bfb
-
SHA1
93dd8a12c16f5d0da2155330ba04d1ced8c86c66
-
SHA256
6864575ff184c189c1a43c5a7ab538fced963a9892ed787e75c8107830b8d5c7
-
SHA512
30eb80f15c618b9ed456262c843454d32d1fadc855839ea7cd376daef9c5ef819ce2d6420d94ccd6a3a51406cdaed13a6cb2220c30803aac6f0474db2c551f80
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 4068 msedge.exe 4068 msedge.exe 4224 identity_helper.exe 4224 identity_helper.exe 5300 msedge.exe 5300 msedge.exe 5300 msedge.exe 5300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4068 wrote to memory of 3316 4068 msedge.exe 85 PID 4068 wrote to memory of 3316 4068 msedge.exe 85 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3120 4068 msedge.exe 86 PID 4068 wrote to memory of 3936 4068 msedge.exe 87 PID 4068 wrote to memory of 3936 4068 msedge.exe 87 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88 PID 4068 wrote to memory of 2592 4068 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fe994b0c5675faa1ed33aa65c7690bfb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac73846f8,0x7ffac7384708,0x7ffac73847182⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:82⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,9473088207379965781,8746823683502003301,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
6KB
MD5d25326dca5dc16e976cd3b268aeb2f3f
SHA18235ce9cc7595d7c0c1c84a71c1e2fa2e6b3981e
SHA256cadb36d5837d37e49cca633b884dc6eb05d09268ebe5c29cbc51c374034c51d2
SHA512e14e85253c245f4235523ca464556ae3238ebc6bf16343f5278746fee4962086ff6a23c49a4ec0781d0b18eba5c8fca0544d0e6c1b817f08a5fadc0330629e48
-
Filesize
7KB
MD54013aa34ac52a1cddd437153c987b325
SHA19c724ac47b00da587d0f915a053974b549dfdc29
SHA256018b86d8939e9bb9f2a6b485c60bb56cf2ef5f2f7f06f47e1259b36c0462c7cb
SHA512acf9bcfcb1d83d19a43824d0029e36fc94ec74c1447a28b64fa27433b18a8a95d02601ab786175d5861b6de16e77b4d52d18f6c8b95332d56bf2fb6a00727c34
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5fd0f210ba46ee3f47bc378c5d18562b0
SHA1470f8007c4e1e5bdbee98c898d1910df7d0ba4a7
SHA2566947e46f49688e5620fde98c3c68fe046f24d2b0f4efaf6709cd7f304c56056b
SHA512fe7644c81fe517f05c4f9490dea1718ea758d4a42ff5bff701ee28e7e4f1989823ba4f617cdc2bcd83b1116530e80f969b54226d016d5b45ef5b0c0933539aed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe578b19.TMP
Filesize48B
MD5955ed44094868604d0e25255c5390433
SHA164a99cc33d88e69f8ba5dc5f9805110baaf463cc
SHA256a18277770372600d6d8c7fb6ebbff7e0e791a35a5adc3cac956c23cd29e64ec2
SHA5126e2fdef8b9170ea10701921a3f56eaaac28eade25be05339a38e415b520565de84b7524b1bae18954cfadb12c8df455811a22d6b42c363c73011e2380ece5f86
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59d0fb6173f5f85746cca708dbaef1537
SHA12d4797d4ffb1623eb596de431b3f9281723ad37c
SHA2568695e9267dedbd0380a97029fff52e61d5fe4f99a29b70881a4201de64e15001
SHA51225579d21860c85cfe5f9b5cc632244c23eb9bc7bf1570d60656f37bc09f6bc5f249acf14efd30f960922a43deebfb10387c5c6335e10559bede3a81db76e494a
-
Filesize
11KB
MD5a0b45ff079a6ff923cadcbc1b81a5b80
SHA1fed97ffd8daec41030ebc1b65ebefb72cfe60d66
SHA25629f63971df69194011210f2bd7daf544b1f8571a75bb2994090cb37103e38f4b
SHA5126221cc8440f3d27173a82c1429aceb1d63f03235e4d62fbf5ac00b133f1d6b6323d5d2edb8fbce2acc3173dee90beefe3f18477e55a97d6f25775b6bedcaca3b