Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
026ab8fa8bbce5eb8abbdf449af958e4_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
026ab8fa8bbce5eb8abbdf449af958e4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
026ab8fa8bbce5eb8abbdf449af958e4_JaffaCakes118.html
-
Size
538B
-
MD5
026ab8fa8bbce5eb8abbdf449af958e4
-
SHA1
088bb3c4ccff9dc04d86e76f81fe156cd0eb868f
-
SHA256
5c2bdd476edfdf870d41e12ea887464d4ffe60054218bef283dbd7382b566e9f
-
SHA512
5e8994a1ee9ce055fe390810ca418dd1b4379ca0875db6f6b8de161d5a8afa415f6f871757fb9edcf96e80246e7305029c0dd9bf9c9aec6f635eae60e87bf26c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 4688 msedge.exe 4688 msedge.exe 4316 identity_helper.exe 4316 identity_helper.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 1652 4688 msedge.exe 80 PID 4688 wrote to memory of 1652 4688 msedge.exe 80 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 1116 4688 msedge.exe 82 PID 4688 wrote to memory of 3428 4688 msedge.exe 83 PID 4688 wrote to memory of 3428 4688 msedge.exe 83 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84 PID 4688 wrote to memory of 3400 4688 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\026ab8fa8bbce5eb8abbdf449af958e4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa002846f8,0x7ffa00284708,0x7ffa002847182⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6216 /prefetch:82⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,14246524106192148721,9144450772981950016,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD561d4d1f03659e68a99b553fbca39bb08
SHA10de297ad7f75a4092898243a2e4a21e9e0a5d3ee
SHA256119184ba69057e5cd249231ac4a0645ae806f6cc42a38b8b4470e67045ed0a22
SHA51298c9337ef23ce88ca78816d343d7540e87ad8041e2478102451abbe1f1e6d4ec7069143ac707dd5765a317c995d72a4cd16cf76fb392898dcc582b5c098be231
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
263B
MD5baecb82b712d08f605345dff3cfb37be
SHA1e3ac884a994947fe98da0e9f13d437f7d03deaff
SHA256667b4948f5af13bda85f8f3a2a31663cb25c20dec130632a1781d37c351386d9
SHA512844daf75c91293009cad1ad4fc06d284d71b82397fd0f0472108da01df689585af27f54b5e714da13aa764aa0989187f9da897ab55cf899b6af19171c9beda7f
-
Filesize
6KB
MD5eb1357a18b89e6fb9e8127b97769f836
SHA18ad46fa46ae6bf229d36cae9eeac1638d79a3a73
SHA256ad41422c424036fd6f2a431e7bc5a05e4e723612ec18698792ad7013002ebe3d
SHA51263331cd88205f994b050905f5c3b83bbcca2b151b1f2730d85e4565ed7f44023a850d3e993fd1f3f9d0483a7634b424ec1749817bc141e4cc24c1069bb1768d0
-
Filesize
6KB
MD521af0a58efc6aa8903826e45179ef34d
SHA11475cebd2ded805eb6f4699420bac2d242f0e98e
SHA2560150ee6ec51396d15c718cae2c20b017bc79e750c2d1422d10cb38051b8b9b09
SHA51236381ed5a46a3bec55eae598ee982555c716f309186587a89e11ad806b461fbbd0fffb141f1bdc599ba7b2613855ebd372ce446fa5d5e708baf314bac5cccd23
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD59ecb8ad099402db1a3cf30a161f44ef8
SHA130936d1e63895f1c871e143445e3975780524afd
SHA256ab6a75faf0874df76973ae0a3c70dc7294819b6a317a01f62e3f3c5b2dc0b0a3
SHA51222a731267839e6fd51cef1113e3ac3ba9be7a3391406799130daaab208ef24623c36fce9c715a7bbcc1d5380448acea7bd5c15932d04d9e696aaa014cc7747ce