Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
8cf7c7f10ddc2a88ecfb621dcc2a5c81_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8cf7c7f10ddc2a88ecfb621dcc2a5c81_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8cf7c7f10ddc2a88ecfb621dcc2a5c81_JaffaCakes118.html
-
Size
3KB
-
MD5
8cf7c7f10ddc2a88ecfb621dcc2a5c81
-
SHA1
cee00f5368a1b30613c6d4951cc2e66b994fc309
-
SHA256
11a9db251376dca82f01f7e0e1b2fa25cb4f88234a0821ff96898d370a26e160
-
SHA512
8b81bde9a9689d469bc0e4596b45b5ae4874f2bbb14953d9d8d8357de6579fd29ca7c8910aaf5ab2fae4e9d280030da054ae340f3f88ab5ab7a3481f55e0af0a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4652 msedge.exe 4652 msedge.exe 516 identity_helper.exe 516 identity_helper.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4652 wrote to memory of 5028 4652 msedge.exe 82 PID 4652 wrote to memory of 5028 4652 msedge.exe 82 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 1768 4652 msedge.exe 83 PID 4652 wrote to memory of 4492 4652 msedge.exe 84 PID 4652 wrote to memory of 4492 4652 msedge.exe 84 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85 PID 4652 wrote to memory of 5056 4652 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8cf7c7f10ddc2a88ecfb621dcc2a5c81_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4d6946f8,0x7ffc4d694708,0x7ffc4d6947182⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9113980033383254899,16923081246779255090,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,9113980033383254899,16923081246779255090,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,9113980033383254899,16923081246779255090,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9113980033383254899,16923081246779255090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9113980033383254899,16923081246779255090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9113980033383254899,16923081246779255090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9113980033383254899,16923081246779255090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9113980033383254899,16923081246779255090,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9113980033383254899,16923081246779255090,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9113980033383254899,16923081246779255090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9113980033383254899,16923081246779255090,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9113980033383254899,16923081246779255090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9113980033383254899,16923081246779255090,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9113980033383254899,16923081246779255090,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5b78a406de0b4a443a80976156cad95f0
SHA1a49ef4ec82172f3d0034ac52f87632f137c87e97
SHA256ff3ac86c0d56465a8db043db84e5f3066628a5a9a5713976e7e0016f464a73ec
SHA512529d43ed75e80bf18a88ca5c9b8263baad557aac4114abeb55291b1f23618c7db0d864091aaf738a9c71d12601690c985158a967acff0e87cb5a495b41cdee5e
-
Filesize
1KB
MD5f846d4e34902c7cb770001cccb17cc40
SHA16d2ddef31a7f300ab63fa78f4b2b2dad988b8a69
SHA256d9559659634d5b30c8742a30590608b0cc861a9f30fa57c0474808d252b0abb3
SHA512e4a75d74dd30650315c2cca201889a9be0b3c93337829bd62cc2ec9ac7eb105436616fcab3089ea9ade1b5665dbc7dcd9f8b6add3d59197f715f220b2797f041
-
Filesize
1KB
MD5a88752078b8b1cf350c190931a274e0e
SHA11b916f9a3b2c1789e5c0bcc39be1d8e47733e5e1
SHA256d5db3471a36773bc7f84f2b3241e66bd1d97909621279c08a06d183a6fbad0e4
SHA512e0d8cf9d971a0d64a287ee2f047665e05dc8c86f53612f05d53784e8d30fc930fdbaf67489988af97f847672814803d38715d270a0d4a379525eaa9aba3440aa
-
Filesize
5KB
MD543cffa2bb7502dde011d9da063cbb5b1
SHA1d0aefdbf26ab5064d1438604b106e86e37cab03a
SHA25621bc43d8c27d52b8f73e5e5f42282cdad89085384e797a385b8e55fc5ce855a7
SHA512bc7e46b5c15b25adca007245a8d63587eb9b7ee4cdf61dbfb5b11dccf1809de69d738c3316542b4751a351e0e6ce1796367143b08bdb6a3cb0f37f4abd8652f9
-
Filesize
6KB
MD51677f99f6f1b2b411e67c5f5d815d5fc
SHA128c5d864b82cc1d082cae61810640346620da83e
SHA25611e8dc47219654defa2e3c014a02589e1ad00860437c04fcf7f84fd2209b14cc
SHA512725c7e038dfbfd3e7c71c4e53656cbec278ffaad11b7cabab2a4acd40c79fa39abbc6532e9f0eec0a38cf504b894ccc4a745dea014b700d1db755a5e7bcbef5c
-
Filesize
203B
MD5e399b6c1526cc14cf861cd20a47b5328
SHA1eea3f78509f5daf551d503e4bdca7bd18557f61a
SHA256776b2e3ddb5e6d3c663a891de814cd6222eb959e3585b4cbfc9aadcdf3ba96eb
SHA512738c0f5188e828c9c08ca99e35d2078522f7b4dc98bc205ad0b107fea472cedc1aa13deefa37dcddb4305021710a0d3cca5eebc0250f0992e4fdb84306c341c0
-
Filesize
203B
MD58353a43373caac5d4bb86646a48ca169
SHA1c8ef9db6e3f35a2a2c44e152a5bff5b2df702d51
SHA2567b92bf30454a2f5c6a1bb3098d0cf4209c840f9c3f098724fb6f7e7a4ef80e49
SHA5126c23a4cbf8b262c3ccec8a16a8f04f99ff550ff9717c3560113456dbd053202fb8e266ebc1d5479d750e48bf5c061649e81d5c3b59f8a3c406f276fe32ed4c4f
-
Filesize
203B
MD508916f479a058df96ddd5f90bbed9222
SHA1746bf92581ccf2f0890b987683aea14f8499972e
SHA256602b649c8977e21e848ed405811b993ba928438e1278431445d1b78c2387e614
SHA512f7d5eedbc076f60aee3a18ddb8a435f7ccdddc95d7c979c51cd144d275fc603a8c1f2f3b7a14f734a7fca1b51624de52668f522647511365859f3d89c8287c95
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD52e11fb471010872e21a3b79e5c40d684
SHA1c12e33ea0b4c701b1241386c3e0b15c36aee1723
SHA25649116b9859217344b4864d16f7cde6d804f61b7c55a503e72111f14bc36819e0
SHA51258b79fed5bb008fb16a7169d6fc1bb5796c7d8f2898382ec96a15383dcdc01a233edb55667fab435bf1ed9681732cd65c85f00fbb9349c51683e3ae75ca16877