Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
9269b3c2a57d519891305125ed806ed1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9269b3c2a57d519891305125ed806ed1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9269b3c2a57d519891305125ed806ed1_JaffaCakes118.html
-
Size
175KB
-
MD5
9269b3c2a57d519891305125ed806ed1
-
SHA1
21c6b1f836729b804e37b0b3b0dba66c394f54e7
-
SHA256
3ccf7a5e5cf82ab0837bc228b85187846c8dbcff9e8e8e70b9f9e808c9983cad
-
SHA512
2339e35edb7acdf2f8ae655f67b8278bbeca156cb5b5525c12b5070d005c3a46acf8c3457009c4d448f79a57e8ce474bb3e22e667eea9b38f71ce710102036ed
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3VGNkF9YfBCJiZv+aeTH+WK/Lf1/hpnVSV:SHCT3V/F4BCJiWB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4988 msedge.exe 4988 msedge.exe 2640 msedge.exe 2640 msedge.exe 4388 identity_helper.exe 4388 identity_helper.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2792 2640 msedge.exe 81 PID 2640 wrote to memory of 2792 2640 msedge.exe 81 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 1744 2640 msedge.exe 83 PID 2640 wrote to memory of 4988 2640 msedge.exe 84 PID 2640 wrote to memory of 4988 2640 msedge.exe 84 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85 PID 2640 wrote to memory of 4900 2640 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9269b3c2a57d519891305125ed806ed1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7c1346f8,0x7ffa7c134708,0x7ffa7c1347182⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16186801734965482290,9505684378067873272,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD58ff4d73f907b0f0d435d5a6236b19ab4
SHA1d131973b5234a23adb7b53842f3071c0dd0dba80
SHA2564453fa3b4203044507b88f0c9d642b53a413480e388502c09096c651b95f3ff2
SHA512f4e92683c538729dd8c43febde9a906baeb0fac5262a88a588fa829106ac88ee54cac5547a64ab433bed2cf71281e51f87928a3afc4380ba92a0098bd39485d0
-
Filesize
2KB
MD53c953f602e7eccd030a61ecf1441d1fe
SHA1483d36c7956b6dbc62f81a46cb540e570ff870ae
SHA2569ade8b279629485c52f77986ed2a839c0dea289174bc4926504982b26886d84d
SHA512a68ff88467107bbf671623c8a098efeb1bdb2e1e2b1f2ce18d8fdd3c182074d6f7cf77db66053f171a9aed1d2eaacdbab4791f583aba7703c225741c202e4d2e
-
Filesize
2KB
MD5f2bc4d5fc4ae2e3acc5438c1fccebe7a
SHA127fbe0942b499aa11625dec782838726887f0dda
SHA256d62f5df80c20b8aedd7527da2c96caafdd88af8c3296af453eee586debf9d7d2
SHA5123fcd96edb3205d3c8bf5a5489b5dd37b4a262f2af73d62a559df1b229e63b8792831ae17226d6aeef8114bf1eb4a565cc99c3563a6aae4a8cf08a42944e4b214
-
Filesize
7KB
MD527485ea19aaaa0275a1eae2ee914bf13
SHA15b97c6ecabfbd9536c8467c319b1d9fb7ae5c1b6
SHA2563e3dadf519af66fe410fc309b7339409b98b73ec2a1b0f23a944b0f10e5466d2
SHA512318243a9e7dd6bd519f313d6dbeac67ae6a67e03ee34cfb9d0eb3779c69f1dec13b1bc9461d7603113c382ca12b39e0af6c925f0a6866c2d74e2bff393762496
-
Filesize
5KB
MD576ce8217b5c887ae2014f9cab1fc23fe
SHA11c1fc8cfb79eb60c950e284b09edb13f447d4d44
SHA256b83aa5de120d1a0c7c0737d5bef4d1e4c43d8e07bfabd1bcdd66f63a87a0055f
SHA512b49de5fecaec72e305436301e21dfc464667843f8c3fe9849140b0f52d3228959994dc18b3c999964380bf5d18611c0c7b59f6d35e241bd53af0cf8e99ba2a92
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5e7ce2a3653e9ee6e4585358bfb7c4296
SHA18b041c79c471be75a152a4f7970c385551f6294b
SHA2569c8dc113cce9c7168ac61d17965a220ebaa917d41b4a4a812c98d022d92c50e9
SHA512eb3ced831c94cc817bd80a8dff114718f952ac47e2fb09abc20491aec664e31376bda1ffbdc9d8ac96502735a5ba0f4350adc0b22bafcf6f9e98088c63251496