Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 10:14
Static task
static1
Behavioral task
behavioral1
Sample
66e98f173bba8fbc4cde8bfc0812811f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
66e98f173bba8fbc4cde8bfc0812811f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
66e98f173bba8fbc4cde8bfc0812811f_JaffaCakes118.html
-
Size
175KB
-
MD5
66e98f173bba8fbc4cde8bfc0812811f
-
SHA1
2b9f0f3c635955bc8b287389abd8603a03b9f002
-
SHA256
a173abe859444384e1982b91cb57be74c29d4995c941d3edb8fca26eb4f8bf5f
-
SHA512
4edc4e8d284c8d262373625953abd9dfee771a129b1f0c997d5308b2edca3c21f562e08f5cc23ce19ee0480c705a210e9364bd337c37f8798fa379e172fbaf0f
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3hGNkFzYfBCJisr+aeTH+WK/Lf1/hmnVSV:SOoT3h/FKBCJiHm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 3488 identity_helper.exe 3488 identity_helper.exe 6044 msedge.exe 6044 msedge.exe 6044 msedge.exe 6044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2536 2744 msedge.exe 83 PID 2744 wrote to memory of 2536 2744 msedge.exe 83 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 1640 2744 msedge.exe 84 PID 2744 wrote to memory of 4804 2744 msedge.exe 85 PID 2744 wrote to memory of 4804 2744 msedge.exe 85 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86 PID 2744 wrote to memory of 4676 2744 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\66e98f173bba8fbc4cde8bfc0812811f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc030346f8,0x7ffc03034708,0x7ffc030347182⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2664 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,2098102074922801,16037781262184456249,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5c2ad768ca4e97d112df0ad8bac18ff7e
SHA1436c9afc83661f385dfc01ef01930dacef25bd63
SHA256bfb37614a2e32d7ba71084d3ba62a38ab7c943a8b3a618dd3e1e2f5024b85a4d
SHA5120c44c04df1705b7f378422fe4f9a63e7621cdc94d5d8aa826a97a9b1b7b0e06d6448c9fc1c14ce12b24f00ee4a984f8e5b13f3c7861335d5f96af0014c0cdd9f
-
Filesize
2KB
MD58aa10ec8f5b2400830218416010779a1
SHA106382fd0bddcb638b18c60923307255e2309f549
SHA256891272a2ecbdd4d0f5831cc34300fe1bd6a4da4b85b19953a4811c23cb3d2eca
SHA512d62156431d95ec6616e43e7db5a5105ea121eca6ffbf857ad9a4a5492f6715489337205c1f6349b99e6a445ccd9c8fbe2ae330a7b622dcb85ebfecdb8085e9aa
-
Filesize
2KB
MD58f0db75afcd7b5bf67ae12b2f3a13d46
SHA185ca3efad520a9e24dfdf1dd634de5a20d1dab24
SHA25629e3583f9bcd804996dbec6ab9a87fe7710bb62cff0202774388e125df1cf5d7
SHA512948aba862d2cea9f54444589cc525b82dd0d9a54328c32138af0b36030480c500a7c77f9339fa6c17e77cfa9152639a65d32f95273c8d0bb1ef9aa4ef7bd7d16
-
Filesize
7KB
MD596719a58822cb8d857d71824f7ddb7bf
SHA141789f21fd23c35b0b39afd03b33a9f15cd4c7f6
SHA256b723c8bec26af71e14553b252201e0e5a5608b6d3032b3ae94a81e8d2b9dbff9
SHA51268b4986e8ad93aefb9ec71796c7429ea8427d931bbe89b6430fa3173916d2c8e85b187534ac9fdeb0d8a1207e265af6108cca17f9e0dd08241232ea3361cd074
-
Filesize
5KB
MD57f5f32e43cc202f9a60447a713ca1440
SHA1ffee1b394a608ef3322c734694c11f800b90c28e
SHA2564440d87ca3cda77fcab2069169834340a160d98be4b9d9ceebf76e67e5f46193
SHA512e8e27f56d34eff58d700f89b851267aa521b3a6e2361c92d869cd9c6e83b1829d86aac7f201c33a37f52fcaad0e6f97d623bb8c63a8775641f179c2ad3466d21
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5825788dcb1f42d6f1df3b3deac01d159
SHA1a40df208d599f8246b88110dd2e39d202604011d
SHA256c7fd884fd83394133db7b2878397f4b3d94d630c2ead19c86f1a6259f8b87335
SHA512ac1a59076ccd2b3f28d6fe65c0834d41925225d66e8638c665fd5a12cb22cd8936ac50627b8830cd735b2dc7a210e95b8270c84fd1ac86bcad5eb7311d120b6b