Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
913054e9a69aa5ff7a0e75a19150c9ed_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
913054e9a69aa5ff7a0e75a19150c9ed_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
913054e9a69aa5ff7a0e75a19150c9ed_JaffaCakes118.html
-
Size
175KB
-
MD5
913054e9a69aa5ff7a0e75a19150c9ed
-
SHA1
25c6318cca70b910626bd4bb43a470749081fa94
-
SHA256
28b57b236001cce636c9cdd949967052b5702ef10a52eb27842605fabb0e64ad
-
SHA512
db0900b8f95685d2716b549173e28b76e1b96329d3adae389840ecc9292bbf2ad3e892a2bd533ac0a798b9f979e60158df0b928e4e47f678b67517bc8b157957
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3gGNkFxYfBCJiZm+aeTH+WK/Lf1/hpnVSV:S9CT3g/FEBCJiVB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3332 msedge.exe 3332 msedge.exe 4600 msedge.exe 4600 msedge.exe 1336 identity_helper.exe 1336 identity_helper.exe 6104 msedge.exe 6104 msedge.exe 6104 msedge.exe 6104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4600 wrote to memory of 3144 4600 msedge.exe 83 PID 4600 wrote to memory of 3144 4600 msedge.exe 83 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3932 4600 msedge.exe 84 PID 4600 wrote to memory of 3332 4600 msedge.exe 85 PID 4600 wrote to memory of 3332 4600 msedge.exe 85 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86 PID 4600 wrote to memory of 3612 4600 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\913054e9a69aa5ff7a0e75a19150c9ed_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc65f46f8,0x7ffdc65f4708,0x7ffdc65f47182⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4380 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,5358273559759896506,16948398723394362108,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD56409d24158d0afea2835203a1a4cd8d3
SHA1a8b662cce8dba5ac40b5c02198944cc236157f86
SHA256198d8d2d0cb319b541cd9849723e77f53af362de1f6a1df4cb2971d07bb5f57f
SHA512dfdb247ae124d57899f5dace20c7cf0f5c9ec864503764868b8a0bea82519364085fc19459b691cc7586932a4be014cb6b036b696fefa7c47d221ae9863eb123
-
Filesize
2KB
MD5b43abe86bb752f649cc64c1986bfc6cd
SHA117ede343c5d6855b3ebe1d6507ef8bcd7f62200d
SHA256034fcee5b20891ca4c45b366f015f3ab98a6f33be7245906b935aa4219505d25
SHA512dafd3251b9331b568ebe256330bc2a601671395760224737502f57ddd1a18916e2941d36f8122853bda42abf39d791993551bbab2206a064bc042bf1a2e58913
-
Filesize
2KB
MD59f0405e965c223090c6b90b4d7355171
SHA1677d6378d6e944d9774b13712633c33a751875d9
SHA25658e646e98251e7581e2ce4fb545adfd75344a664830bb61c018b38a639e93f55
SHA512046055e0dd611d22ed8eaa1833d4622abd344dd2208df38a5b1fd11c095f52227907f558950961ce71c2339ce32f763195b8a3f346ebcdbb8b1317aabb3ee7c5
-
Filesize
5KB
MD56cdb63cefd30b741565b2b7d19b9fc5d
SHA1ea1d21e5486f3e9011477643bbea591072207d59
SHA256f107239dd2dde8409ded8bb79dbe94757ab2d20781471d4a0a415e920654f4e7
SHA5129584656846f5bf025ef2d479a7127041ce5a013d00c48ce5ebf5e8f7639612516d02708cc9a3e0278aeb2e4816b4ca292eff3c6c87e3f5d59d1ee90461fa2d31
-
Filesize
7KB
MD5bc5d99ab083c28d4915dca2b8c55bee2
SHA16d1b69c4e40241ab2354080d2a6f3f3c29284704
SHA2563832d4b3fd7ae12121d754362557894ca614adf6ef2548b803f2108961958062
SHA51298f296d47dd9841e9e9b1513ab9b2f8d39e69fc98df1462d4f47607af9942ee59fd6aacefb537039a9c0343a7d10e1eead7c4dd9004de69feed511430a6fef6f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5975126eeb6dff065c3c85bd84506fbf8
SHA1a0fcbe173a1176992594741202b0b8a73bb933f1
SHA256b74ae69ef27702bf915dfafd39ff249d5d460387d78d7bc38ef5822a76746abe
SHA51202b3b69b4e8fc51646b1b7fdcc4e047da02787baf469a679d0f2a4edde508376506b7381f611a983f23b48ea39d2406161062bff2b57037ec2b77687a2fcccaf