Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
28e2d6c6ad43e70c688e8e47d6fcf7ce_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
28e2d6c6ad43e70c688e8e47d6fcf7ce_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
28e2d6c6ad43e70c688e8e47d6fcf7ce_JaffaCakes118.html
-
Size
175KB
-
MD5
28e2d6c6ad43e70c688e8e47d6fcf7ce
-
SHA1
cb6bd873357c4519f0b99e489a352bb812049293
-
SHA256
10e38b868a2c6034a150ecbb8e2880fe598b89ece742d445ce807f1b6165005a
-
SHA512
57b19fe6691cd585c6ae680cb6bdaa07125c75f0e1c634c2f8f8a6f7ded04f0f25bc31e92e58833cbac0049a0d0ee385eb164b01d44e98b4db6eb241e76818a3
-
SSDEEP
1536:SqtO8gd8Wu8pI8Cd8hd8dQgbH//WoS3YGNkF4YfBCJiZd+aeTH+WK/Lf1/hpnVSV:SaCT3Y/FdBCJiMB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1252 msedge.exe 1252 msedge.exe 4860 msedge.exe 4860 msedge.exe 4876 identity_helper.exe 4876 identity_helper.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 4156 4860 msedge.exe 82 PID 4860 wrote to memory of 4156 4860 msedge.exe 82 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1060 4860 msedge.exe 84 PID 4860 wrote to memory of 1252 4860 msedge.exe 85 PID 4860 wrote to memory of 1252 4860 msedge.exe 85 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86 PID 4860 wrote to memory of 1520 4860 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\28e2d6c6ad43e70c688e8e47d6fcf7ce_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9272c46f8,0x7ff9272c4708,0x7ff9272c47182⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 /prefetch:82⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,900682602814328685,16309509516119195092,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5a6150106ee3c4691ec5e93d1d38a262d
SHA12e4abdb17453ef4474202854d7603fb94b30e71a
SHA256170ba145742c7b39fd71dab758909001d650d2e54de8488bf144131fc9793e0c
SHA5127737f6a63715714e03b1507764d1b5bbe4504b74f025d80801db5dde772a643bf014b231ec5a05f72fcd3f9dbd96d3a593c8d1a03d2972f9bb018171a14540f3
-
Filesize
2KB
MD54f7575127232aa2899315f229ce50b7a
SHA13421c0988efd51617ad04fb0a8963ecce40845a4
SHA256e21360e7af82f0c7457264a5f77644ef8927285e3c1089abd461565416f9fabb
SHA512d4b9c22da11c258fa6b1e1ff822cd36b574d5e12f2147158c3fd0fa1b60d4e4f8c4a0eebf144f7b5f6ff055eddb69f77a2847c67ce7fe8ef71a22cf22cbefc4c
-
Filesize
2KB
MD5482f7801c886f905413e6cf524a49a0a
SHA159868b9ea15d5c0876ae7728e6bffb62c0a1a334
SHA25633e5320b6640e41b2fbea07ad450d20e8b91d8f2407042b1b8e7afccc916db73
SHA512021f3a7e9e340aef252ab1ded21c3a5ccf3338202f432a81e8225f7732c18c3c584b844b2b85a502438ce9a401d8587970e902cedb49c804fbd398b3f5227448
-
Filesize
6KB
MD50b3557e37705d8215353d5c9ae6b27a6
SHA1889314c1cb9511beef392a0417b4dd774e89c65d
SHA2569765d7b231faf9d1d4ba903937ddbd0c2530ba3b447a395488baabecb11464ad
SHA512835f1b32320512996b0e72b6fee6210115cb004afe4831700a3adb98cd65ee5cf8e5bdeb2a3bc3e5df3885c526a3de851302ef7bdd33657672f4f1fd8f2b2a0b
-
Filesize
7KB
MD5834ed183011ba9e4d1f3ae65cc22a0c0
SHA109f8fbe9f9560490b18420935212fb010770172b
SHA25658c63e878e32f6dcbe520937def910fea0944cd670dabfa8b05a893a16f06446
SHA512fdd64286fbccc6e4819c42207e383ba2644d84896d241f65081eda587a283f76f4b88da99b5dfe9d43f9a76a34b4042fde6995013fd718ab0cf6a80cb714f8f7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e31c7f77a13c15d62c9e7c81bba165b6
SHA12eeef02d187e364ea596404787795375c15d43ce
SHA256df4678185806dd2b114639ebef620561597a47895c733de1b12c38b385c65d17
SHA512181f38fbca87b3e5d01d940ce83df071516f3e7be32f6c406c46e50578508d847a4f86dd1255e947ae4c2eac21cd7b306268c6ecfb35cf512464ef804f260c43