Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
7a2d2c3f9cf96b1e3ae7b9600dd3ca52_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a2d2c3f9cf96b1e3ae7b9600dd3ca52_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7a2d2c3f9cf96b1e3ae7b9600dd3ca52_JaffaCakes118.html
-
Size
175KB
-
MD5
7a2d2c3f9cf96b1e3ae7b9600dd3ca52
-
SHA1
d45d24bcb0e9a45f241b75ff3709f453a1b94d73
-
SHA256
d7b522fe05f5176fef545b979e7573281972e86c9e203d78d42b0829fd242f18
-
SHA512
2c0d14e849e0d69d9f104797c519b184c3e3890a5ac1f94ca01b7ef44d50ec9e70dd89d7881a98294f9893659154ce5474822780fabc054045b1e17d23f6c346
-
SSDEEP
1536:SqtK8hd8Wu8pI8Cd8hd8dQg0H//3oS3xGNkF8YfBCJisZ+aeTH+WK/Lf1/hmnVSV:SpoT3x/FZBCJipm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4144 msedge.exe 4144 msedge.exe 5716 identity_helper.exe 5716 identity_helper.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4144 wrote to memory of 1800 4144 msedge.exe 82 PID 4144 wrote to memory of 1800 4144 msedge.exe 82 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 1672 4144 msedge.exe 83 PID 4144 wrote to memory of 4632 4144 msedge.exe 84 PID 4144 wrote to memory of 4632 4144 msedge.exe 84 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85 PID 4144 wrote to memory of 1408 4144 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7a2d2c3f9cf96b1e3ae7b9600dd3ca52_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d51846f8,0x7ff8d5184708,0x7ff8d51847182⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1960 /prefetch:22⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2752 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:6136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3312 /prefetch:82⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,4897756945312880624,11820860677649586570,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD55afb9f53c508d272ad5f19771f645e51
SHA1e0d428c9877dd9848490f6be441618ebf69ccaeb
SHA256f60560c526535d7b67cbf7bbc64f78398f3e85597aa0c9c73017a62cd9dd12be
SHA5121d03e2d529715375596a953be577cc673f70558fd140b70f458f89b2e82cd62ebcf62ce3796a2b5e48eafd93bf320b9d17bb3afff2ead02a4521e11910805a80
-
Filesize
2KB
MD51f5291581a82ded9d904aa8f1b231e20
SHA1014329c1a66ccbd67e8cea3a8bc3a1f0377c41e2
SHA2567ac416c838561739548d280ffbf6127afcba80ca4eeb8c5f2de5d277ebff6b43
SHA51296db29a3f16fe9cf3e5912b5de5ed83411c5148dedd8669cb3542ef618f3576d7b415c487ccd48972f3535e60969cd9963aa3f6f80e825205cf1170a6967bd52
-
Filesize
2KB
MD5bc187a43c82bcee3b63e2d2079501ba1
SHA1404860cbefcc18d198d11510e8f0a58552ebd619
SHA2562dccba447d7df56198b6464e9131603c8730bf87fa30ab3b84b79ce5e0131541
SHA5124fa99782abd64859deed36f352d566c00267e32cb784337cad66603c94284610c9164113fd494179d006b9d936fdcc56d054fa79c807c7ba89e39a115933539e
-
Filesize
5KB
MD5b0f171c1de4aa4a9a167564c9ddf2bf6
SHA12a6739ab8723b454b32afc2a5718569652348a94
SHA256f38b54b57eed956c4fa359a6611be5bb85b8c0c7b08d7aa26512f38b71e1c6e5
SHA512c699d3da873af293e4dd89595c52a934510685548c11116641d035b62d4eb6d825691eabdf112391d2ebabb6840ca24a6cab016f713ef92c542e29aa91f4796a
-
Filesize
7KB
MD5586211c3bfb8f8ec92e14b4cf53b85ec
SHA11366cbaa4477541260c14153a02304ea51bc8206
SHA2562ea5cb8745e29543f885f0670e78787cdd9cf989e5d45bd3e4f198df80c87a9b
SHA512a538ebf38f8951f8bf7ab7a3c9c1cc0f667f98e9005e06003354ad608a4325bbb06e2f35ebb449bcf85635f71805c9a8d7226362b5741a58a97858d01d0ee72e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5ff13a68d99c1f056a39fd2648860fbd0
SHA142fe143ca7bdd4494303933821de3744e376766b
SHA256395f099be60196877e623175773aab4f95518bf507b65729f9348d697c51a2b3
SHA512fcc6fae8ac3480116354e1fd3a9deff78edea15389a44deca46c39f8828a052d5ac5daa4bab745b5756583bdd585bd46763b0c3fed09d213d8a162f37895f697