Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 20:02
Static task
static1
Behavioral task
behavioral1
Sample
364e48f6db48cea7555d2eb79c71b996_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
364e48f6db48cea7555d2eb79c71b996_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
364e48f6db48cea7555d2eb79c71b996_JaffaCakes118.html
-
Size
94KB
-
MD5
364e48f6db48cea7555d2eb79c71b996
-
SHA1
f313922ab37f467a622c1f3cf05329193fc68aea
-
SHA256
3eb4164fe31b1b658286ac1d0620f914005a48c2a1690b46f59e2f8a0ea356d4
-
SHA512
e6c85b0a4f912f36c0e4fa8d623285fa800f28ba0040b36a10c34789bc7184ae6fc5fa30492f7fc73aab8232c8b8a31007e55389c8f087a9354299fcceed2c4b
-
SSDEEP
1536:5WVldjeEkhPOwrObtOv4gOs/O7OAv40CE/ODF6drD:ewm1b8APs2S4MDF6drD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe 4068 msedge.exe 4068 msedge.exe 3860 identity_helper.exe 3860 identity_helper.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4068 wrote to memory of 1784 4068 msedge.exe 81 PID 4068 wrote to memory of 1784 4068 msedge.exe 81 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 2300 4068 msedge.exe 82 PID 4068 wrote to memory of 4528 4068 msedge.exe 83 PID 4068 wrote to memory of 4528 4068 msedge.exe 83 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84 PID 4068 wrote to memory of 2560 4068 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\364e48f6db48cea7555d2eb79c71b996_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd711f46f8,0x7ffd711f4708,0x7ffd711f47182⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,2938903472128949333,14396170032214200215,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,2938903472128949333,14396170032214200215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2544 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,2938903472128949333,14396170032214200215,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2938903472128949333,14396170032214200215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2938903472128949333,14396170032214200215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2938903472128949333,14396170032214200215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2938903472128949333,14396170032214200215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,2938903472128949333,14396170032214200215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,2938903472128949333,14396170032214200215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2938903472128949333,14396170032214200215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2938903472128949333,14396170032214200215,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2938903472128949333,14396170032214200215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2938903472128949333,14396170032214200215,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,2938903472128949333,14396170032214200215,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD550f5d0948712e6887132c0eb8d39a31f
SHA11c7c644fb6aa9d8819a9be8356277a6ca62a9d60
SHA256b65bfbbc77e34a1a67c190a26afbe542a757e4500d6b5218e9dd034074b994cb
SHA5129917d8028e0fbf16d1e2971ae4778f25f2ecb64524fe30e7cda13ca73135369302785d976a41a7af4af8166a597b71fda008af2f96912d3e81c69b64c0057e35
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD58ac0221d1eb356c727970e32fcda99fd
SHA132150e3b6d8aea9e4ca29cced4112af71516828f
SHA2569d58e7cb4dd0f1a64495c7776e604ad508d0f5144cc54b354c3cb09b74b30c45
SHA512133b3ce9db96c4d11a8db3fc901971223c277c2f591077e5b0b9262ba0c886077a82f5aebbeed4f299997ca59a9ddd69d24c9e01af2edf6bccdf032656c1f1cf
-
Filesize
1KB
MD51f0562205a8aa29a7f4af93280bff513
SHA16169d9ef557a0fe95062770c11b4dd462dd9feec
SHA2568656e5b0c83bfbae746ddf06551daed745fc6380d02275a8d21c82c863b405ff
SHA51281488f71f27e28c2af4a5a99a7c05b49768e185f047168f468b58a6d5bfe3537380bbe3e48b80c907befbc7712d758b0b5425c8e5652d42578abfe1765cb1dff
-
Filesize
6KB
MD5e9eae6cb5fb367a555231977fb383b05
SHA169e2ed46b69d74dada9d80151ff094fa99895da3
SHA2568e5fb614ef2f0b18c0d5da7976310fba0cab485bd19970ad4a83243168e7f428
SHA5121776028b4554475f468994605272eb77d6faa283e31f3b697d780d3eb8d2162efd5380f06b01b529985e8097e6dcd95214903c3494ce2d9ff5be525efa655684
-
Filesize
6KB
MD5c158cebcccc78660890b70c3bf9a6f4c
SHA1be512e3c0f96558d9bdff1dab078cd011f3e13ac
SHA256b44ec1a425b3b1b7f18a95067c956f2e16b69851e5a3734279df69135f4503fc
SHA512f12887c5296b432792beeaf58dd33c4bde07ae4d50a77c65f9a5daf537d45172996a02e73a26bcd45611f5d28006e87862e83246f2bdc426d71f8a77f7a99613
-
Filesize
7KB
MD590f46d669d6edf1778af0b832f979656
SHA1b2c2e6393f774a794a7ce572c8d1fcbcc9bd7c74
SHA25650dc600f70fbb8cdd705706833b172586e615e49b88711a19ae4483c10357da0
SHA512370feef2ec7c7dca84b76beb42bbda7a601043a9b575953b07daacb552ae334496d9703e554904d658db19f6be62e9a6f4c808e8579267b0e70ca1f4a2b67ba6
-
Filesize
203B
MD578e746e3532b80d53d9b8cde8d6839e6
SHA117389fd040074c02886f29e2bca485f45055b636
SHA2563fa83d70418049b8e560047e7dbe82ff55cd41e7f814f54c0300abfeffa8bc2b
SHA512ae2a02bc20d1ef8dd570bcf9aeb402d04b52afcccd0c60e8480ecf610a685817ffe2e2e6478382dc133740fca5bb46c78760a213d8c4e9b7e378282f14f9b100
-
Filesize
203B
MD5b23c65d7a9673f6d1bff01a96d880c94
SHA13444ed14b491400dec5d2121c162e966ab8bbfc0
SHA25687fea476e609cfbb6badd8d4dece37d06556e96cf5cfbcf7008d44c585f859ef
SHA51295909f7c5ac0b60aeff79846e8f51f0fc078300a67d737d73c59c1952c61a39fa67bd50123b437e01be3857ea0724a2c271320f76615b86d3c7b752bf5c55b5b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50e05ed0e11921630de9290bf6aa07053
SHA14892f02b18d0281368633151bf07eb87466638cf
SHA256b5969b3408825214233792069f4c4fafe52d3cb7e18059c51460cba5a66767b5
SHA512d7fb0d2d6e619267057a023f3acf190b7ed4944d9b86f966223de11acd129813159cbf4d6cbd140c1243921d7130662a9dd57dca1afcd80822d3695576e87de4