Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
315e2d622f14044103168ed38f36ff77_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
315e2d622f14044103168ed38f36ff77_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
315e2d622f14044103168ed38f36ff77_JaffaCakes118.html
-
Size
175KB
-
MD5
315e2d622f14044103168ed38f36ff77
-
SHA1
471ff97d48014ae0f92dbf6633f1117523841010
-
SHA256
7c894347c8b5783002e5f64d2625798244efb14d6e88c0603561400b70aca3fc
-
SHA512
e594389ca7a0f03b18ae52fdcc851955fd397990e9fef020c9edb602048ce17d3cf998503b7c93ed17433226281fbc6937e1fab49872c987a1dc52c68bcd6125
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3KGNkFJYfBCJiZb+aeTH+WK/Lf1/hpnVSV:S9CT3K/FsBCJiSB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3832 msedge.exe 3832 msedge.exe 1584 msedge.exe 1584 msedge.exe 2696 identity_helper.exe 2696 identity_helper.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1584 wrote to memory of 4056 1584 msedge.exe 83 PID 1584 wrote to memory of 4056 1584 msedge.exe 83 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 852 1584 msedge.exe 84 PID 1584 wrote to memory of 3832 1584 msedge.exe 85 PID 1584 wrote to memory of 3832 1584 msedge.exe 85 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86 PID 1584 wrote to memory of 1520 1584 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\315e2d622f14044103168ed38f36ff77_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed44d46f8,0x7ffed44d4708,0x7ffed44d47182⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2580 /prefetch:82⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16478290300959781452,10070195667796622781,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD59cfb3991e81b901466cfe7860aa5be67
SHA1cd20b3929f5e27e4ee552eb8e7f859c4e58ea54f
SHA25683a391a7796768ad2b49b5ba4cd5fb6654d0374d11a796a9baee92e3b2339d7f
SHA5124a2ca8358356b9468cd7a804181d4dc4030897ebe1144c93a2b059afa3eb29b921821635a9ce42ffe5fb7f0fc72cbb695bb3464b4c0094e66a3ede45248c8ea8
-
Filesize
2KB
MD50c904dc71b50d0b8b6bd6af3fb1dba07
SHA19d74173ac0ce5211fc68ebe965cea4cbd6c93752
SHA2569c3b2fa7d682bd4db8eb493bc02aae9cadd8da5fcbf01f025ae20d5465424e25
SHA512b7871340ed4738821b1802baf8b2f0ea06eed7d24fe56f40ad8c32dabcab11ad347dac6d7fd921ad56e0be56c36537c58bbbf0d24627197d302c7de6a3727e06
-
Filesize
2KB
MD5f94785272dffa9424dbb55a655148cdd
SHA1b41227ce7c4579c6ef9c6f74fc27881fb8c8bc50
SHA25645e8aae18d00d2c0482cc9358f75ed1eae42a2cc2a2d09b8be79e9bc22232218
SHA512fe21e23886b17074be3d4d67ef503919f09cbc8dc685d272bb2c51c298ec8494cb6d382237c2068a11bfa400ed64f9bc4c22d521109beeb30d5c67728b4c977b
-
Filesize
6KB
MD5ecd9423e5609b3e6dc3aa586f3524e43
SHA17b5eda65cc097aa99283f18a03714add90e68498
SHA2560257b15fde716ff5fe987a44fd6f84d28b5c6738d3f477d7a82d3d7f258a11ab
SHA5123c2e29298c15e08c9e4e7bb7e7ac5117b6a31c63130977de27055c0cbeeea64198451169105a6f3dff974f2a47cdd2b6cfbb105c0fd944b176fc57bd23340b9b
-
Filesize
7KB
MD5c3baec7b7c645123487c30eee02d0f9b
SHA14da0ebe578ec115d154ef74d2077158f7ed71047
SHA256f47631c8fec26d50780d863045e7cddcf45decec21d28b226890945c5d2ae9f3
SHA512f1868ff434158eb969dc95392b1b23c61cca9229cc164760e9f3d7d68fb71093a4f2e66f42072cde81853dbd959063ba0b2bd445c219a375bc7c363f0914e0f1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bd67c70c028db14b284b0c90d0f3d32e
SHA1b978b7e01b22dc09d036602307089674a899a236
SHA256debc6c09dea48f83be2cb9d19fbd0aaf884a83d034b9123b8e22820ef0e57fd4
SHA512962d6cb0187050acdaf10597b82ec1f4b5466e864c7db8f46df6fc6c04cc077a4139bfa7fd3a0034718b02e8627dd1e2d768194ef4d891d6e0db13b060f63206