Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 15:41
Static task
static1
Behavioral task
behavioral1
Sample
13625c3cc0fdff2320915cbad92f97dc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13625c3cc0fdff2320915cbad92f97dc_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
13625c3cc0fdff2320915cbad92f97dc_JaffaCakes118.html
-
Size
175KB
-
MD5
13625c3cc0fdff2320915cbad92f97dc
-
SHA1
656d60e50c570943c7bf99ee448b554479d2087c
-
SHA256
20f48317d285d0520b0399a544da427ee05e104c5cdb20f7880e80973977ffaf
-
SHA512
f94bffd0fe24ec945205619afbb0ac8eca8cbb0936685007c4cf2331cd26de9c0ef4a57d4afd676b2c8a0ab50acf01dde260807508557b62b77d0d66b0bf4281
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3AGNkFzYfBCJish+aeTH+WK/Lf1/hmnVSV:SOoT3A/FKBCJiFm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 1576 msedge.exe 1576 msedge.exe 4524 identity_helper.exe 4524 identity_helper.exe 5836 msedge.exe 5836 msedge.exe 5836 msedge.exe 5836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1576 wrote to memory of 4072 1576 msedge.exe 86 PID 1576 wrote to memory of 4072 1576 msedge.exe 86 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 3916 1576 msedge.exe 87 PID 1576 wrote to memory of 2328 1576 msedge.exe 88 PID 1576 wrote to memory of 2328 1576 msedge.exe 88 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89 PID 1576 wrote to memory of 4596 1576 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\13625c3cc0fdff2320915cbad92f97dc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff129b46f8,0x7fff129b4708,0x7fff129b47182⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,4723586803235412859,1737802322952242624,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD529b84c2d23cf47fd98cd874ef2a53e1f
SHA1ea4af526aa2e4a5ad413b43908487176e4a44712
SHA256f15b38c83a34b4e5c506ddf02860404fc12bcd28b6151eb05cc98564bfa21b0c
SHA51232019c7100f25a03e7ff626d107ba9d40d50836a3c84a7a9c42230f022ac494c57bcabbc2aaadad30fa6e0761f3e7d1e8a566130ba12ab0ea0dae403f78b0882
-
Filesize
2KB
MD5e2f31be014fae0e453e58f3c81a1c42e
SHA11b24613ea68d20ddc556d5f499b11273b29b25da
SHA25682a2f8a711c0865b5933bb2923fb63c0f806e291222b13613e718baab90d0d21
SHA512af6738eb37293d1b69ffd85e22700b237dc80780603758121dbf16e804c49cf68bfd4ac58d26f1ca3af041b9f61d2d0c7fdb8ac58207c5f671d8eb1bffc83310
-
Filesize
2KB
MD561bd86d4cfaf39ea3764cd3a423355ed
SHA1bade993ec3fccf134e510e23ec3b3deb741d8fc6
SHA256d62e1cf56a8e10f15f0a4c79d1271324eab665c14a1d24e8dcd4a9e59056b14f
SHA512b52136cd9f2f14bb06cb29f3e8032c2f77faa8d0b5c6068bdcf64b72917b90afc73523986f2f653a88378d46c63c1570073efcd0be352d420c142a270b3eebdd
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5d72336f65bceda2a41f91b6c5f8dffd0
SHA1c6fec0550af07ad3cf0166a572e324251d1daa6f
SHA256447dd9c49dbe935ee67d8c3d34c72df6c5f73d1840dd38c93c298402af6b1165
SHA51249663de75c94245b3dcf66d3817cf56aa42cc60c53bb68be681bcb5adc8f8e5e4ce74b2b4d84637dcb773fcf5428711cb3ed045cfe5ac23d12f92d7365a9760e
-
Filesize
7KB
MD5cd0fa75aedd41c5d2b757ff99a4bb033
SHA166a1906dbfac95060a4cb17b9758a9e90fd1e21a
SHA25631e796f1ebf87a0b6b4401cf44a2b86bff02140a8dcac357ad288dbd47966c54
SHA5126f93f3ffd0a3a34055cbd82dc8eaf77ce0697f1d1633452d242604c9a50e0bd21fcbbc53325eca51a66aa08efa1018ad69fe0b6e2998516b4a110e3850b676ec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ace4d5942efe19c1f118a2c7277284c8
SHA1c63b05c13b406d8120c66df03f0d791be1990b28
SHA2562acad9d2a8d6b40fbfda3358af31f04e97e9c54f35e5419b92faa77a7baf4714
SHA512c5ff48f122f8152e2ef1a4c5b2b8e8d81e96b666928fa914c01d96ab344e9ed325974a53a7e8eb85f73843315937df2a3aba92c363c6283125df86226cd10396