Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 18:52
Static task
static1
Behavioral task
behavioral1
Sample
4c8d93b1b5f7ff9ec64497d7e67d7888_JaffaCakes118.html
Resource
win7-20231129-en
General
-
Target
4c8d93b1b5f7ff9ec64497d7e67d7888_JaffaCakes118.html
-
Size
105KB
-
MD5
4c8d93b1b5f7ff9ec64497d7e67d7888
-
SHA1
09fa5e9382c0eecbd7d01243e25f8703b9574c5e
-
SHA256
d073c2540a262dadd12923045cb5772e2e8ae77d918d9a9e0c80e1443e3a2097
-
SHA512
02760e3cc31949bb2a5b0ab1b96a9bf0e22e9ba7577b249af26739793f73ee5c2ca97b5ed85214fb54a8ed648768c061d144ecd3c40e10386d66a8af8e0f2482
-
SSDEEP
3072:AgJXyhGIxqc3nwDzC7cmYV1KdYSbJfrTlVp5Pp/iqmjqbQ3vVB6cLZ:RJCpA67cAdG
Malware Config
Signatures
-
Mark of the Web detected: This indicates that the page was originally saved or cloned. 25 IoCs
flow ioc 70 https://r01.ru/ 26 https://r01.ru/ 74 https://r01.ru/ 87 https://r01.ru/ 37 https://r01.ru/ 24 https://r01.ru/ 71 https://r01.ru/ 88 https://r01.ru/ 49 https://r01.ru/ 51 https://r01.ru/ 50 https://r01.ru/ 69 https://r01.ru/ 45 https://r01.ru/ 22 https://r01.ru/ 38 https://r01.ru/ 23 https://r01.ru/ 73 https://r01.ru/ 48 https://r01.ru/ 86 https://r01.ru/ 46 https://r01.ru/ 47 https://r01.ru/ 72 https://r01.ru/ 21 https://r01.ru/ 25 https://r01.ru/ 39 https://r01.ru/ -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 980 msedge.exe 980 msedge.exe 2448 msedge.exe 2448 msedge.exe 4768 identity_helper.exe 4768 identity_helper.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2448 wrote to memory of 3156 2448 msedge.exe 83 PID 2448 wrote to memory of 3156 2448 msedge.exe 83 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 2384 2448 msedge.exe 84 PID 2448 wrote to memory of 980 2448 msedge.exe 85 PID 2448 wrote to memory of 980 2448 msedge.exe 85 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86 PID 2448 wrote to memory of 2000 2448 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4c8d93b1b5f7ff9ec64497d7e67d7888_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadc0a46f8,0x7ffadc0a4708,0x7ffadc0a47182⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,12313236084305075640,14857009736147824009,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,12313236084305075640,14857009736147824009,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,12313236084305075640,14857009736147824009,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12313236084305075640,14857009736147824009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2080 /prefetch:12⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12313236084305075640,14857009736147824009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12313236084305075640,14857009736147824009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12313236084305075640,14857009736147824009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12313236084305075640,14857009736147824009,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,12313236084305075640,14857009736147824009,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6204 /prefetch:82⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,12313236084305075640,14857009736147824009,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12313236084305075640,14857009736147824009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12313236084305075640,14857009736147824009,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,12313236084305075640,14857009736147824009,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD54eff13ff010cb0db013ed714a6c140b3
SHA13a19a52a6308664b62c18a828d042f9725839911
SHA2564270dcbcef5130dec156ca76c21966c213e9aff702c662f47f8a9206a64dbb24
SHA512b3d938a9e0f13a8cce047a22db6fe6404cc7c64246c01afb560fd733088cd02dc81ad011ff776c63c5f20c40c0c066130baa31a3da9f959609983feb0e6e3fe1
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD59a2d6cdfab09418aa28ce2059b0ba1a1
SHA1b0edc4c445a44bafa00cd673bb1027a106e56137
SHA25629827708411a5dc06654262a02d4c14503e25cc25ff2e2647d4393b804a63e13
SHA512960cf54fd26aa25703ef17f69d01759566305dce1fd6551ae9a27b5312cf2f56bc22f0aee5d81959e6935050a1db86349b9bf60e5158330e6ed58c7933647d52
-
Filesize
2KB
MD590571166a7f0148fab6e0d868773f91b
SHA1ff08679f9ff9c15305603048bedd6e1b45543b55
SHA25668a5c7be714caf32dd0de4d2314a910df8ab491a8ad9511bf76f74271c5377c4
SHA5124a386348709ee4dd2069cd4f13f17463b2e408d92f67802aa194aae7814a13456488954cfd4ce32687a82b70b267d9e681bd1e79cb59971cf50fb44c841d96a4
-
Filesize
2KB
MD5eb26148cdb75736c51cc61747d715062
SHA16ed5f7605623a7d211eeca2d875b89b1406140c8
SHA25693c61430fa88c6edf52015baf41bfdf169dbc5da869184efd5c8c4ef89dc8424
SHA5122760849f5d3fb7ce1bf75b69d9c637cdfe1fef2a34b8d71c2ac9555c0ea4a61932deeb96b1095e112dad6bbc7f0f0269085258667ed013ed76da94748b3fba62
-
Filesize
5KB
MD5de96db0033930d7c12f8faaad2d7791e
SHA13e6a0976dabd562230485f048d680ed90f52e992
SHA25612a5d257ed9ef393ba4dfc1b607eb94fdc33fda25b1f7002504ae7b623f1a302
SHA5121a9bcc2daa0c249daa36382200c63d595898d6d1a3b9c7f7a3d45c6c621bd2c828a93f84a535ed6b6a7212a94c130c3cb25c451a29357e99a5b55a817f53e286
-
Filesize
6KB
MD53dc4d7f563658965455f02dfcdeb3221
SHA1a017f83648df3492b925429111b51fa0682f54b7
SHA256cc23d66309a786519fcf6d9200b7a80681660da865b3d7176e1b27d4ffa22ad4
SHA512d08228b4f28e7ad5b0990840dfba686dfd18ab2fefc42fa74e231d3ae7f75d21999e1fb9fa4c64c35bbedd12ec2128e7b28c7d0eb2785022672cf819224de46a
-
Filesize
7KB
MD541b5392d4d7a4c5f5bd93f41bdd412a0
SHA1d2bb197b7d1d0b3ca57fb541324d3f7f4ec14f21
SHA256cacc543c42ba26698f866d9d46aa0848047283aaceaa543920e46427631bf80f
SHA5126d7d0ab57697d8878ab15df0df15250973b651144e391163b8f01551c43096b72af499349fa606d0ede6dcc3dd448cbd6ed493861ef3f3b1e5df298f5906c098
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5d91a40041e5585d6ec674d2ac3992fa0
SHA13f089a7aa4b97d3684c020d29c83e30f4b2e0956
SHA25661e19c75c7ec5ce68e100228a038ffe9a24d3efb9902ec2b673ae998d583fd29
SHA512b3bb81560e7e4a9340b56f602d85c16c7363fa466e3d3d18fb7115ef0a8606673b43fb51bc8ddf65e13e438e726dca2a9fd5ee02a2d81a75f3972dc3cf18b697