Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 04:16
Static task
static1
Behavioral task
behavioral1
Sample
8956ceb96e09aabbf601f4c16a7b64d4_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8956ceb96e09aabbf601f4c16a7b64d4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8956ceb96e09aabbf601f4c16a7b64d4_JaffaCakes118.html
-
Size
176KB
-
MD5
8956ceb96e09aabbf601f4c16a7b64d4
-
SHA1
07b66b3f218261e816fba2b3c61d6a2a6a2ffd4f
-
SHA256
6404d381d473e715b855ecf3195af52c79d27c388e88f4afff3f412c6a9a2fb5
-
SHA512
0f0b2a33d85029dbf940cc0233b3d869931c525fb72ee8a509c9775123ecaf573657fecaf75e0b2ae88adf39ae59ed17c1bd87e80f5715d475d07dae26a564b4
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3GGNkFtYfBCJiZN+aeTH+WK/Lf1/hpnVSV:S9CT3G/FoBCJiAB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 760 msedge.exe 760 msedge.exe 1492 msedge.exe 1492 msedge.exe 1372 identity_helper.exe 1372 identity_helper.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1492 wrote to memory of 636 1492 msedge.exe 83 PID 1492 wrote to memory of 636 1492 msedge.exe 83 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 1836 1492 msedge.exe 84 PID 1492 wrote to memory of 760 1492 msedge.exe 85 PID 1492 wrote to memory of 760 1492 msedge.exe 85 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86 PID 1492 wrote to memory of 4376 1492 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8956ceb96e09aabbf601f4c16a7b64d4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea6e846f8,0x7ffea6e84708,0x7ffea6e847182⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,5342470593079139604,12165120402811875605,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5ed798b727cd8b7ce20437a761280bd0a
SHA1b3b1211426cf4791e3f3d9377f84bf25c94663c9
SHA25616eb7166a490623a0c176238f8a11c566e48eef0f3c6e07fb4d92bb84897d842
SHA51241b43fce346671cdfcc5187446f784f8765a534b385d2c36ebf7f8d4af93713178232e2b719a91b0e1938fbc5de025274c8789697f37d33c80ce4b577ab57350
-
Filesize
2KB
MD5ece1bf505f7bf96e6831de486cca21de
SHA1b0d3cf647a4b8384ec6ab574bf5035e42f3799a9
SHA25656194a6f1ef5438e402e4e1f9650862e7536f88caa39bc99de284d6f61cd3b05
SHA512e235ae20072dc5a9ff621bfaf683f9073632c90a6dcdb91d9cdcc2f3b581c753d4f5ecbe7471d4a5c05e07f8b7d630b0a1d537cb1c90aab2c7ee8e81ccdb6843
-
Filesize
2KB
MD5bbfcf165d59dcb8fa23384098b76d571
SHA1884d376e7835383be09ee30cd45e21e815ac2467
SHA2568a65b0248943c4ad2f0407c2e7100ae813bd967cc799b139511db0372969d49e
SHA5126007eb81e2c9f910d377f757ecb3b2e75a132d80ce75108e9ad2e7f4f0713ef5d0bc2230d805312038b18ffe46c8371126bed6354e2e3142d124ef256edb04db
-
Filesize
5KB
MD5256242c7ac0127cbe63fe66ab900cd4f
SHA1795ac8ca083fe6dfed2ae577fc24f94d5af51e55
SHA256f186c077e87c4d10627ad8547b85d7e00a0dac4cc3385af790bd1f93a6dcb971
SHA5124910541e894473b3fd19f451168170f4093e09baa6bfb038091672de55c6e65f0f242c683b52994a8293c59a2a305ce4aac99909838e9419c3c7e34ad6e85cc7
-
Filesize
7KB
MD548b5568b636c70847012c47085726748
SHA1b3e31400e02bb96527b1a17971ec7728a81980ce
SHA256ddd15196b8f861961f0e976e46d16c0fbe50697c0c415ccf144e6af7c9649706
SHA5128d86b89254f9aab4eaff0dd5323d7340dfb8fa443f58ecbd17b945779b60e16989b3117ee0bd63ca8dca7175bc3cc7761da2af5e36db514cb440119e8605cff5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD521b9f38ebba1cf7ecbf2444c882ff317
SHA12f17629db77eb3ca433c521aa1df988653e5973f
SHA256e8305f28f6f30e6e0bc68f92be622086400c61496159b38ccb1b2cb36c582ed3
SHA512f4743dcd1da2823cd63ad5605a1e0ba0de6f05af65c85c60db666cefc387c8de48aa73812c2c17ed5c8e2ee2c272b12c000ef83072081dd1f48f4ec9d166a95e