Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
28674810fa47775fdd4162684686e155_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
28674810fa47775fdd4162684686e155_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
28674810fa47775fdd4162684686e155_JaffaCakes118.html
-
Size
175KB
-
MD5
28674810fa47775fdd4162684686e155
-
SHA1
354b2d201e9048929bb4d063ac5ba09c4dfab562
-
SHA256
75e3d6e1926809a6c6bfd47baaf2c7e4ef16256d4c2c0ce98dd1e9d405bc51e5
-
SHA512
8adcf98c7ffdd6cac4235a7b961e726ab2ea5987c3b0a0dc65d94e8114dae512e1c6ea6d71d44b62f8b4315b5473816b4a3f7845eaba5cf104243d9b9197221c
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3/GNkFHYfBCJiZI+aeTH+WK/Lf1/hpnVSV:SHCT3//FWBCJiPB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2264 msedge.exe 2264 msedge.exe 4696 msedge.exe 4696 msedge.exe 1756 identity_helper.exe 1756 identity_helper.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 2112 4696 msedge.exe 79 PID 4696 wrote to memory of 2112 4696 msedge.exe 79 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 1224 4696 msedge.exe 80 PID 4696 wrote to memory of 2264 4696 msedge.exe 81 PID 4696 wrote to memory of 2264 4696 msedge.exe 81 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82 PID 4696 wrote to memory of 2512 4696 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\28674810fa47775fdd4162684686e155_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2016 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2988 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4572 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3416 /prefetch:82⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,9161335085948792470,6985464785494006161,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD52355a760d736e4339d3894bde2c7145a
SHA10cfed57d17dbea3827b104523bd5be63fa78f269
SHA25613367ac697921454186a99845554314aacfd992400b8e93f91d3e7d3cd32d829
SHA512baa46f044f41900e6d8d0326913709befc2b8e21652530a7adc4c332994016315dac82e870a0a69e520de6fff0541864cbe84234f68d228b65303d4dd6fb985b
-
Filesize
2KB
MD54805a95e90f604a03f0706ce7652e208
SHA1f2a0f0412b5c2c1c9d5d05cf8fe776d69bb2ed53
SHA25684c4902ccfa8895945ffc128fb17eea03568a26d5364aa15cdc879cbdb57e141
SHA51261d1315e42c9d49573beb826ddeec98fd7df28e5628b8e5d8f1ab062a644ebaa02719b8ebb1ea2eac8a89c2c8d6646bbd92a87d61499629e82bc753cad6892a4
-
Filesize
2KB
MD5b7cdcaaed7939eb8f167b6b52737c697
SHA17b83f92685bdcaf1ab717ecde2b0525e5d2e7310
SHA25698817914e50733002e2ac1ee8993251850a3ae764687edf920d46c669967f3d7
SHA51203139aa0faaf151a93b55c3575cc37e1ffd93c57497324cd26dad70901824c224b4d0c8a979b0ccb1bda0b7378b7c37170ea6cad2b1a7b761c6e27a19fab58de
-
Filesize
6KB
MD599b78a7f3e5fea1ec09d3ce7502eb5fd
SHA1f3ffeb2cf403bc9bc03ec02b6372115f96513127
SHA2562df22c5a3481ddb6c114dc660a363780de6b15cd01f44a0919b5be3c66c11af7
SHA5125f3afd73579bd9f3ad7bb659f9614a2ac7c6c1bdde94408e7d1f3baf4a3cd5b3f93c2d212534804c95b11eb16bbbad9573c6dad44d0475511fe468c1ed0682ae
-
Filesize
7KB
MD5b87538f77538aae3316852442756e22f
SHA1da59ac4a97e13bbaebfb6ac0bc451c8e51ebb28f
SHA256e0c4109e57cdb2b4df6a8c8cc58209ce378a6da2e5854ad1112238a592de70df
SHA51233864903525046a970886717bc78207d1b284ebcb858440e21e5d59a722b3e6cfbbff398fa00bc6eae1088f8369309e77f72b301fa74015d4495de5bd3b3798f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD514cd458085f6beee3cb61fd252af039b
SHA181d71722c166fbc3a96d2c5de8de15871e15a5d7
SHA256ade2cc9d400764bdc9309f4bc5720004d9d9fd00d8f7438c358cad5022a2f286
SHA512bb55dab20819a512f10dcdca7587cbdaf0cfd567a210242d30e9822f869373c197cf4363d5ae123e755d7df9d1b273217ba07f29a314576e0cecdbc290897152