Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
32ca3549b1375bcc459a3218e8c48867_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
32ca3549b1375bcc459a3218e8c48867_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
32ca3549b1375bcc459a3218e8c48867_JaffaCakes118.html
-
Size
175KB
-
MD5
32ca3549b1375bcc459a3218e8c48867
-
SHA1
f2d794759eb34403829e3e085ad1b63cda3bf96f
-
SHA256
08dc26810b3938f5be96530d289b867d9df4a857830aa6ad052466a92150677d
-
SHA512
9a8b0a867fb4bee034a51e1885b42845ee4757758c10d0210c2c91de748be6f98ab9cc71e0b9d6f15025d29d2d0e002f380d2ae64422b808fb0fde9119438985
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3RGNkFQYfBCJisM+aeTH+WK/Lf1/hmnVSV:S4oT3R/FFBCJium
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3080 msedge.exe 3080 msedge.exe 4128 msedge.exe 4128 msedge.exe 2156 identity_helper.exe 2156 identity_helper.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4128 wrote to memory of 3764 4128 msedge.exe 82 PID 4128 wrote to memory of 3764 4128 msedge.exe 82 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 2076 4128 msedge.exe 84 PID 4128 wrote to memory of 3080 4128 msedge.exe 85 PID 4128 wrote to memory of 3080 4128 msedge.exe 85 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86 PID 4128 wrote to memory of 2388 4128 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\32ca3549b1375bcc459a3218e8c48867_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fd0746f8,0x7ff8fd074708,0x7ff8fd0747182⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2644 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,14130173204175774237,10140714650338803512,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5bccf514ad5b3e81c067578af278d3cae
SHA1decc222db4ad7c544cb27435bdd58242fb717317
SHA2563c6958d6ba318af43e97e759a3242f1e2091f8b593a0c5a9612f18a0f08b4d7b
SHA512429596abf9a62d7b6c69f4197cf22b1e7dfa3e6df8462a9aee7eafce841ed29c6029f14fcf8373f68541442e718ec3ce72b0e0876fcf7aa0ae07d78d989137b3
-
Filesize
2KB
MD57f6486bf5d1bf9384e166fc1ea77743c
SHA1a89682edb90c95d261e7a3194c1d94199e85af5a
SHA25673e854d1fbe83005530df20f2f6e31318e8a83006dd28bfb06295089101f2ac9
SHA5121dbf326e062ff60b1123aad77db62640c5cd9752d1ee2af17ee60836403b4a2decd856c42616d423003789e07df245e81dd7e82a18344d7e3a40bb427ecbbaab
-
Filesize
2KB
MD556c9c649d0f6564be24b6ddea0ec4c62
SHA16c1fcfae4f0e32091ba8d97dc0c62b9039cc6bd7
SHA2564c17a534fef7f533296b668207334d22ec11fca4e699a512e608be66f3aa69f6
SHA512946cfb0243e7dfb6248b57534972f8fc61b2cd4b4803dcadb42c0c18d5d1685edca6a8cb03d706a757c045712a4bab5a8ebbddaf6418c5df7358eacdadc457d9
-
Filesize
6KB
MD5b3d40777b5eaa34cf110b9e14427ab98
SHA1c415c48151bc3a9212417481a18cda4b62c8578b
SHA256d5a398e7f8b4549ecfcdda0e8aa61d98399b27460ad9f8abf1cc202482cd1142
SHA512b337d57f6a1baae609d128136c5aebe8f2d0527a7069d01a1152fe68ac1514c8fe477af11b0416615b8793fc655caf95fa2166ac6fe9dfeb86cc9db69c3dc938
-
Filesize
7KB
MD54331058bcf5e8903534c5753893664d0
SHA185c95885081378498598b4820d63ca5d5fc443ce
SHA256ca2e318b5b7d962d55cb4d6031454d3539ac4dfb9f9b203ac0b7b81cdeef91f1
SHA512687cc169d2eb3e751ab8151fe4ca3f53a91f9d8f8ebee41004ca1ec43e5fec6c054a625762033b6eb05ceb5972344ca4115dbeba2004224179061b68837199d9
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5c819a1b7ad529b6319acdb1a8f47c5b4
SHA1bd84e9ad1784db5bdfa977df8084db10c2faca8f
SHA2565ce97b637d3bddb0003ab88f6ad7af0bf5cec0ee420a7f832680466d15c11cd7
SHA51204aa08d9743668ced058098edc4a5c376eed28d9478f93ce625545f2ae334c7fc10a327b7be47d19bd5a86d56b60205ce2f969f89a5e76ce0b9150b50ca18c70