Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 13:05
Static task
static1
Behavioral task
behavioral1
Sample
675a1b564d5a3d98afc6f031a38d8fdd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
675a1b564d5a3d98afc6f031a38d8fdd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
675a1b564d5a3d98afc6f031a38d8fdd_JaffaCakes118.html
-
Size
995KB
-
MD5
675a1b564d5a3d98afc6f031a38d8fdd
-
SHA1
06adab8d9fd59f0f171ffef10a5ad06535b2b7b4
-
SHA256
7cd81f7b2701784c54ad28d1b79f3509a3e86375411219fa4c971cddc9c8d7f3
-
SHA512
00d93018fee50ee47f0fe82863b50707d3b84e83e1ba138f971f11bf5c8fff744726fc3552e88ccb8fb3f91011f572cb9884ec231782902e76b77efdd68dd3cf
-
SSDEEP
6144:7kcl5rm06APidjNx3rLB360zPqnSmCt88yHihEt5SGb86JZheW21BKgKZ:7kclF36jdjNx3r40+yfmY1+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 2536 identity_helper.exe 2536 identity_helper.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 5020 5004 msedge.exe 83 PID 5004 wrote to memory of 5020 5004 msedge.exe 83 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 2440 5004 msedge.exe 84 PID 5004 wrote to memory of 4028 5004 msedge.exe 85 PID 5004 wrote to memory of 4028 5004 msedge.exe 85 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86 PID 5004 wrote to memory of 3520 5004 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\675a1b564d5a3d98afc6f031a38d8fdd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbd5146f8,0x7ffdbd514708,0x7ffdbd5147182⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2592 /prefetch:22⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2644 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6244 /prefetch:82⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2392,17316814541404288128,5491984008075611286,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD557bcf5a6fd833d0a89ed136355ea6716
SHA164f402c32bed4b2480ac981c81731025be51ab10
SHA256ea0c58c23be5dc89554843f43438d4a676b7d65e2c0ee01277b539c88af9b0dc
SHA5125b8ee8484718e284adbb8a7aff075864d77a47ce8e0c979a3ac91e187126b312b55e59962e2bc2b5fd239a279641bc949e9c0d4b72ff3ba355df2e1d20d31ce5
-
Filesize
1KB
MD542cee3461aa85109d03179bb8e9558b1
SHA1650ca8cb66f9afa20e9efc702282c012d0039283
SHA256357ebd66472bd804fc4ceb84e874fb01070a0e221deede88f5118f90cc4ce4c7
SHA5127483673554bc760d795a074821166611bd294269c26700a4e5dea7f42209c1e45bec445f7edfce5a5a96319ad7e7f12c9128fe13bdc362b8981b0161ccb903a4
-
Filesize
5KB
MD5017fd394d1f863d8e245aa98ae1d7166
SHA146c6e27013b55735006ac944a6821b5755bca48a
SHA256e0f57d0d3539bec28df48a96151488d471d48240296f579eb7142f308012dcb4
SHA51201b35a20b044f65382760914acfe1b261db1464d051631523ecbfd3bb94c983e3c8d862d6276e1c51bc768e5b78c03a2b2dc125ac42b456134a529dc5864356c
-
Filesize
6KB
MD5b4e31e92195a83f55fd4788b6d1c2808
SHA1495863dda6e370367c825e2338fa4ba8e6724a38
SHA2566e54b7f8f4b97ff5d42a9e91da256b22e0d344ddd3b6e6b3962c0a7fd62f4231
SHA512cac4b33240504f41031c860b0d698861f6ea0bb44e70f1ad2216c929da71f2ad0390fd973b4388c0cf533e049af8c46e819494d0a2f09edcbe124bb2456e94fa
-
Filesize
6KB
MD5407566d74bc5a256c8f89e10fa0ccd16
SHA1f04180eb8fcb8e329293d68a1534009f9caafde2
SHA256cce1945d372c029ff1d534636e7b4a86f5a8598932965ac6a9fb7e93d8780470
SHA5127183927d8c62850106e00ca35085c84defc7219ca0d19a9e18681030ff40231626aa7302fe32db5ad91b2b4de3937045565afcda5bffc732c1f6ba9e5e5f1484
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57bf765de600905a276303b96a3311d18
SHA114cf9a50a099719a39e7a68c989980375cf87f16
SHA25648ff4217cb56222f95d0e03f7b503f0d867cc700a227880c6a162e5aaa9d08c2
SHA51250f4d1c664890465958f3a2503a5a37ac1a9248ff6f524b2a4731ba2e2d55c77c1fbac0ac95eea7e83343a32ce5109d8e1aff726e0eb88e56a2cb243b376ff11