Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
33a3e82e18542ab08d908ad9cfdef44b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
33a3e82e18542ab08d908ad9cfdef44b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
33a3e82e18542ab08d908ad9cfdef44b_JaffaCakes118.html
-
Size
175KB
-
MD5
33a3e82e18542ab08d908ad9cfdef44b
-
SHA1
609a9740304597d0ed3f9f8c5a13d611c278834d
-
SHA256
4c2ced1fba995df10765cebe0d21dd13ac11d793475c0c83e8afabca88fe94f4
-
SHA512
e3fe190260f0ed306bb68fb62e419275970afc5c69f04ef73436c70fe09f10727ad2c56d1d5e59510f4ad607345017434e764a5c75b0c007dc4a72a39db202b1
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3KGNkFsYfBCJisE+aeTH+WK/Lf1/hmnVSV:SOoT3K/FJBCJiim
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1332 msedge.exe 1332 msedge.exe 840 msedge.exe 840 msedge.exe 3524 identity_helper.exe 3524 identity_helper.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 840 wrote to memory of 4604 840 msedge.exe 83 PID 840 wrote to memory of 4604 840 msedge.exe 83 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1316 840 msedge.exe 84 PID 840 wrote to memory of 1332 840 msedge.exe 85 PID 840 wrote to memory of 1332 840 msedge.exe 85 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86 PID 840 wrote to memory of 448 840 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\33a3e82e18542ab08d908ad9cfdef44b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbaa6046f8,0x7ffbaa604708,0x7ffbaa6047182⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2868 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13580177428282029889,10412510470668670858,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2468 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
243B
MD5412617d05faebbff4d1f1a5b7ca8dfab
SHA149d3c8ebb3225c67e57b4d836162b745c7d5ad19
SHA25626710faa87affd168833d518e2a472bd6b3692ae171dc1ce988209a9cacbface
SHA512b4316d6808a3a74815ec9d237af9e607ebe0bca0f0283514cb9514b053ef9fe4156930a759f437240b4c36b0ac91c11143b2859197f1daf66985bf8f4d449f13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5d79e9463762fc66bc2fef5f8c7a4964c
SHA172ecb9510060b6fa4a378d70f962eaf311d3f45e
SHA2569baf9651702f8178c615825fddf684ac4a9080404e62e5cf396edd00ed26afda
SHA512df8c81663d6df16734194696d69c41749730f7a8f4eb97e9ebd67e304a9f77ab4e0dd52ec42fa7f817687cda151fcb104f6a2ac3314b4e7944b90d56ae2655f0
-
Filesize
2KB
MD5a21b3a8a156c4b6628cb6dce0c7c28df
SHA1c707eecac9ae404f20cd3bc6b0d9b185472c91a3
SHA256fb1aca910ce57a94ec4630ffff488fd3aafa17e51c7dc489e769903aa413a6cf
SHA512da8f49c52d2fef6cb990ef588b6000fac5a2fd78a259ae9f935f9733f21a4c0e1cd039470dcb334b1b997e1cdd9bd90a6286b0671fd59f6145e4e4cb254fcf15
-
Filesize
2KB
MD50862331065e2b341c5e5bf2720c33dca
SHA112c671431e7ec7271f1a660e4d6cfb8ae47dbef9
SHA256ac63b1e91abd1bb24002ab05ddba152e3e75d9f25b2d69ba48500e72405b5f26
SHA512fb67e8fa00296f37fb6b0e793aaf41936579a7cefad07b434d06d48ec8e713b41212a28bc95d11fe928d9fca8cf8844fd80fd962dde2873cb5722517f65036ee
-
Filesize
5KB
MD58f0d0583f1691ce238bd883b13a92e02
SHA175fb5037428ef84eb19fcc4ac16130d8260a8afb
SHA256bcca45441517910e31c1cc540481c181642fdf7db221d34283780943b82e00a7
SHA512b4ab191a12969259f7a4f1d3ed2adfd9429d9e5107b2613bd59ce01676ddade8985e996f7909e826060915377c2fe5db0c667a0bc3aeeff0ecbdc581e5d43f8b
-
Filesize
7KB
MD5d4740cec268f88689959d7d8a265a71c
SHA19bf6775a0454bfc492c68707104fbed42b83127d
SHA2563e8d2c2001e46f91232d10fb5bc982bb0c77c58d2bf30d0172d9ffe8aa71ec2e
SHA512263390cd114b0dbd9ea43c10e21db244fc48edd6a9879df5a5c3b12a1176cb203d15bb0621cb0498d3517eb6785cd49d9038d2fe014a1d9b131d47bc8f1be060
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a01af93d8a7267d93cd53a067f48201b
SHA194d757b48bcf1687f85aac678087643f8653eb09
SHA256425f2d05b942fc4ca5a511d212778d99518edd7a4d0ae832d7634b9110fcb5c5
SHA512daac40048a53d435734b83b229d29538ebe804bf8fd604e65e4075118333d5e0a959ad3a78a914855d56f89d7e99d732adffcecf9dd8715d63bbb58f55da4a55