Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
0f886170018785d928db4271736c7b1e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f886170018785d928db4271736c7b1e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0f886170018785d928db4271736c7b1e_JaffaCakes118.html
-
Size
87KB
-
MD5
0f886170018785d928db4271736c7b1e
-
SHA1
c9a5751acfc46b61b35eff70e19d7248c5bc5730
-
SHA256
192d0163dd46598765ca0595c5d0a779b5d3c045f00a9949918b11226b20d8bb
-
SHA512
f9eec3149933aa87f845edb071f7a190f4e026d2a90a38f90022b3f5ca402446a22195ffcce96f2b9ee4df98493c735269ee254c8fbfde182da5380968ad808d
-
SSDEEP
1536:bQwV4pM2aHOlyPzljqi49/LzM4W3tyOFDE6tdt1yFUtacPq7tR0+9uRVjZb:bj4WkzgtyOV91Fq7j9uRVt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2748 msedge.exe 2748 msedge.exe 2528 identity_helper.exe 2528 identity_helper.exe 5484 msedge.exe 5484 msedge.exe 5484 msedge.exe 5484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2748 wrote to memory of 3056 2748 msedge.exe 85 PID 2748 wrote to memory of 3056 2748 msedge.exe 85 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2744 2748 msedge.exe 86 PID 2748 wrote to memory of 2776 2748 msedge.exe 87 PID 2748 wrote to memory of 2776 2748 msedge.exe 87 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88 PID 2748 wrote to memory of 1728 2748 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0f886170018785d928db4271736c7b1e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbe8d46f8,0x7ffdbe8d4708,0x7ffdbe8d47182⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6420 /prefetch:82⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6345989705726423614,7246120887200205135,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4ba230e1-6c6a-4efd-81c8-1801cc31130c.tmp
Filesize7KB
MD516b234d7487cd36731c0b0cb52faf46d
SHA1be9fe5911c01c03154752cd69c8f721924828d06
SHA2562018879f5b872d388bfd0943c525e07e96b5c502a5390352f9c37f0c2136a494
SHA512505016ad1f0dbf519d0abbf220c078b78a5270356180a8c4cf61a6efcf1abc66659f2d0a34338600c1fd1dc886dbf35fa959bb361bb7dfd77997d6e1ed74c05f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5f239622ace6cabbc08f8ef092a9139a1
SHA1d3483e50dc5636a226b68aba98f13725afdc0295
SHA256cb5beb9988a2cb586ab67d8c98b2fac31dc61574143a7b8585605dbf1924bb8b
SHA51235ea22f2de0239d632702458db39e4771d1468e60b6fd8e45a2eb4bab541611b972393138a67c762c0c64c4d75642748c00c399e77ab8fa24597c84b437c8c22
-
Filesize
3KB
MD5fca5b6992ea3fc08f2e3bb59fea86f19
SHA17c52f5bbf93dff2570b115e4d6200a13f2e3ce2f
SHA2563957661adcbc3302a28ca4b22f84ceb1671cd93b02a194d6e4ec4e6ecd8fb1aa
SHA5120eb9c2d990c685448c2a51b583aeb9b75007c75871e32e4a9dc560f672f8ac8b3e256e0fe02726616972ec865f105eea040c3d000fb561810fbf071d9b735950
-
Filesize
5KB
MD57ae51b2318e6debf62e953d56a6ed371
SHA139dafa6e208404977d6a73389717e511e7104cf8
SHA25698db216e0e7c81ff7d9cd0a32baf85f9bc067e6528300db243a4bb33b3fe55c3
SHA5123457791c0e440b434546f2cbb19bbb426e8c86b963f57c12d39cea2475ff95cf5058898468d175b4bb08fad3d1005ce2edfd793b309bcd3e780a194e92543471
-
Filesize
7KB
MD52fc85659bf8ef58270530d9545e4c61c
SHA1f1440a3092aaa64904c784737c1081f95306f087
SHA256e6df69fd00b2f4f527b7d18dbd9ef5eb497ea4c2a7c90701a7aee17a24d2e171
SHA5126ada4eabb750ab6a3c76ef89c0c2e7ec36ae6e376306e0e5d11549111b228b46062be76cdb9fe07e5a3f001fe457c7329c4f3f61cf274edcff9c790082a3bd66
-
Filesize
6KB
MD5950cdf83259e75b2ba9fafb604d0aeda
SHA1b29ceb6911eaa00d602a7bf8553241850b6f44a6
SHA256a4606c69f030fdbbd2b7dbd9d3b879f509efcc71771ab0971cec5401e75ac33d
SHA51242999c6900ebe29337066a87d66e5cccc3c5e5b46825c22a83069a7eb4c8ec5916c23869c8cb76db494421611da3e587ed203acf80f850f56f3247af32d4b253
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5608ac7f85922f778dd0e58fa858a0ffe
SHA1a80a7cd3db1b03781665e140d21ed9dec26a46c3
SHA25671b4b97c5ef568d01459c3ae0804d5a86a849d7805094235be7f1e064b92e336
SHA512d9024ad21dc8b85d6e0351e313f51feb28a7496a0f88064a848f118f6d80e1094efd24c24789fc66daee7322df6d5e5d08f4d30081c3f7263e64d3c490e5f19a