Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
793d4eabc24d8a9b4132684bfe1fd248_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
793d4eabc24d8a9b4132684bfe1fd248_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
793d4eabc24d8a9b4132684bfe1fd248_JaffaCakes118.html
-
Size
175KB
-
MD5
793d4eabc24d8a9b4132684bfe1fd248
-
SHA1
f45cb9018b0fbfffb0d54016ec51f8555ef7789b
-
SHA256
43be2a81d643d02952c28aff582aff5fa949f825bd3b6d415db1014a4ed62db5
-
SHA512
e120545d272a5340b62476e98c67d6d1e98cd7e0877bfeae039cc460998c385ad64a87e7f59ba5e8346dcc23880cbc51c7675276ce3c82a9ee0dc98f93448cc6
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS37GNkFaYfBCJiZJ+aeTH+WK/Lf1/hpnVSV:S9CT37/FbBCJiwB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4224 msedge.exe 4224 msedge.exe 3444 msedge.exe 3444 msedge.exe 2364 identity_helper.exe 2364 identity_helper.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3444 wrote to memory of 4436 3444 msedge.exe 82 PID 3444 wrote to memory of 4436 3444 msedge.exe 82 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 1436 3444 msedge.exe 83 PID 3444 wrote to memory of 4224 3444 msedge.exe 84 PID 3444 wrote to memory of 4224 3444 msedge.exe 84 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85 PID 3444 wrote to memory of 3468 3444 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\793d4eabc24d8a9b4132684bfe1fd248_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8cf4546f8,0x7ff8cf454708,0x7ff8cf4547182⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,9826060057526301511,10708482150033197441,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5fe37fa1be6185cf709341565be14472e
SHA11048e5898d02d44de21c3ab9e36c800b89b093fb
SHA2562c2e5ec36968c4c187801538219db5025acf6f9f2b7fbc61f7dacca39d509101
SHA512982ccf50a9db2a8860df445be87c8486abb781d3440e8fbd2cbc9e52d7de6c29112863b7ac60fbdfa98c23c1e9c71f2377ece04d594a0035d2e458a73724cb60
-
Filesize
2KB
MD5d0cd91d36930c8e7b53a7ec7dbbbffa5
SHA1ac2f5b2dddcb0985cacd54fc6bb847ee5decb989
SHA256c05e9c3dedd5ee6d38e12bda66a366a4b0c7ec3bf33d263ada6c11fad8e43f95
SHA5123ca8ed545a17c4888f47207868d7ee46767e1ce83fdb1803a913ba210d6c5155b82391fa72a7514f20e75a2cebcb4ca42ee1f2545bc5471b15d823bd5b4ae7fc
-
Filesize
2KB
MD5745db844ddb835bed111a55ddb113478
SHA1f19386d31b99632ffea22408206b67f720043d38
SHA25627d0e6db85959245c5e46c220697ef6b455e0684a71d1d58d868b1db723cf484
SHA512a6c3b51c6fc5f0c4c989835f442288663fc4e5bb18892b5c2aa2fe5b3cc064abdf7e06ef5384a9da5c8f0758634c150700c1b0a311565d7495e84ed1e6a729db
-
Filesize
5KB
MD57506c866e3b44d732a372b63289c6210
SHA12a8f00ddf533cf8830285ef185ff9f05dec04e82
SHA25679899c4f1ea570674b33bff597791de498459692d4a3ce42a2bdbb7a521cabfc
SHA512bde22f1a70db2222302e607e9010f1ac4ca7bf43680afb0e43d40ce070ff5d2513dfaa89a7fc5389c7426ad8d59223edd623add7b0b00b7298e75d17a62f89c4
-
Filesize
7KB
MD54520e863fe243ba6c6ae7353032875cd
SHA16ad9af5ed8886d1a151362587e3d9edf68974c3d
SHA2565cc05ea4469fa2b0d90230e102b080677699e64aa91d6c75127a6306a231d141
SHA512366ae2b60cd70cfc0a61c59e69331751c558207a723cfe1733a70466745cb2fdb0b9c2892ed2525db8450563da132cd3c0f25582103302d7dd8fb4748f179728
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5f3763be6c2cc131ea66cc743fbf0e55e
SHA1e1c8c9deae115b1c7fdbdb6fd8fadd16d1bc60db
SHA256a90838ecc249d6e0768007dab519a3d4abed6e3f2e3b0b020f06d9b56227b918
SHA512e08c95150659ab31e830e123ab113642851c3507f0069ccfb407e0cd053a2c1bcbabfe4d7a3f546dbeee79fdb30f144f929c3525dd547af94079db70e2e02e21