Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
166d4352c1d9874b430428e534309514_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
166d4352c1d9874b430428e534309514_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
166d4352c1d9874b430428e534309514_JaffaCakes118.html
-
Size
175KB
-
MD5
166d4352c1d9874b430428e534309514
-
SHA1
63fe0dc807c1fa0b292dc5b39a096e1e6c61b669
-
SHA256
0057d3b6972e975cc114acf17486ccf2dbb989bc109cce63ae2b4d91e5c79d87
-
SHA512
17c3797263e060f428c1e5ec95eb6cebc609b9f029bc91acf59c2ecda934b3a4f00d4dd80d382fde2d14286f93444ca17f77cb4750e66d183de48c9c6a341e57
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3gGNkFkYfBCJis2+aeTH+WK/Lf1/hmnVSV:S4oT3g/FRBCJikm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3052 msedge.exe 3052 msedge.exe 3012 identity_helper.exe 3012 identity_helper.exe 6008 msedge.exe 6008 msedge.exe 6008 msedge.exe 6008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 4744 3052 msedge.exe 83 PID 3052 wrote to memory of 4744 3052 msedge.exe 83 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3576 3052 msedge.exe 84 PID 3052 wrote to memory of 3668 3052 msedge.exe 85 PID 3052 wrote to memory of 3668 3052 msedge.exe 85 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86 PID 3052 wrote to memory of 1552 3052 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\166d4352c1d9874b430428e534309514_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdadfc46f8,0x7ffdadfc4708,0x7ffdadfc47182⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,3811853913900378546,13072513211288080429,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD546ee867cf81f5286d745d16cf3a9c04e
SHA1eb55949c507c8f5d5e35f21feb35693ffcbea65e
SHA256f115682c26a7754bd170dce59678cff3f5cb50d2db37524f617e64f941a58409
SHA51283a1bb7657d0bf942f987e23436d44a5abffcb7d7ab259f881f7074565e4b703e61981cf5ede63db7334c2f8598beac5a0598b49392cc7ee49b07dc8fd66619a
-
Filesize
2KB
MD5efaa5e1f033a299a5925110c3fc256f7
SHA1ce8498a9e24e193b9c233068b5fe900b330e0e5f
SHA2569f69cfd70c6f560791e4c318dca4a493ab847184e0f4fe6921560d107229e0eb
SHA512cc76fa3dea134309ebee318b4f78410c1b1a3db57be7f0c3fdc33baf3940ad309d964cfe5e45e2cc28f3e852395fff31fabfd337bc20051a2c003caba702ee52
-
Filesize
2KB
MD5fc09fb1497d55d06571f2a17d335352b
SHA1a7e1f248ed9343b7c459443ea2402c6e00100ed2
SHA256b88487b87faba6c806960b3f1270641b6cf0bb263d6e39e1044b633103cd196f
SHA512402d17fab9418222713ee7d5b9df8a3f7cda762c4cfa2e39055a9675ae9bdbd4e03a4e46b7f9bebd96f2306f4d0fd6c567de26b327d615579eba6d7421d5fea9
-
Filesize
6KB
MD5fa467dd6e7d07feb8b237a28e748fd29
SHA198b28c3ca6a72163d1ae47fd271243c3e5aac800
SHA2568124d90624b07eb3f99b8319b62cc6135e88042502c5be5c87046d9aad6d972d
SHA5123fffa957e8dbbb595a95637d0d4a7ef9fe97af7903b75fecc10d5a36696fe4276bf4e990740be41900c8272c6fbe182cfc9b569ad1fb778f9e6129ad5558b62d
-
Filesize
7KB
MD563c1245b9d9f718f6fe0dc8627bc17da
SHA10a927503bcf734a88d12e00788f6de8bba5be6f8
SHA25651cd754b42d4310f5dec272d45d3b6197b22671fbbef88766dea7f69f984d2d5
SHA512c15e3c8bbff5cc9405b6eb0496a81f1ae73f76a0a0610dbf30bc4ffe0fe02a4bbf9d38df343a027698856411db55931cc1b2bbd9a53b6399ee064b9b4ec82522
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5ede6b45844732ab3a3bf46431d1613d9
SHA11e42b0bb13d6f4bd9064fda2d48c3cd2be9c6542
SHA2562362e882e9c5f2e28003c3c0cb2e9d322515f91d0c3c21adb8eefef96ed0e6ec
SHA512e6bb204f5413dd44c3f0d0d0134b7f78652d1bcf2836e0ed51ea1418ff2f92953556a507d0360a52efe050ac8ace915824a882b45f4e1f7c8e565be4d519d43f