Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 08:55
Static task
static1
Behavioral task
behavioral1
Sample
97aef66fb0cedd586c9b40e78986010e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
97aef66fb0cedd586c9b40e78986010e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
97aef66fb0cedd586c9b40e78986010e_JaffaCakes118.html
-
Size
76KB
-
MD5
97aef66fb0cedd586c9b40e78986010e
-
SHA1
b5d3ce469c6353dd4149ed4e3efdae84d9be833f
-
SHA256
72c0a93a86a82a6621ecdf1c92724364b35f561dcec5d4e0d34192514fa9b28b
-
SHA512
79233076061104f5b21f52eda1b9fd0c908f66834e89fe559d7a1944e1814c387b60bc22e3b236d143b9c2b9c11c6f6af22a746ebb4f8c631fa8d4185e7aced4
-
SSDEEP
1536:8ebiklcWklcaklc7uG/bI+3SkcXklcPEijZeqhREijZeqLUyyn5qDTTRcm/a1odh:KklcWklcaklc7uG/bI+3SkcXklcPEijz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 4608 msedge.exe 4608 msedge.exe 2440 identity_helper.exe 2440 identity_helper.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4608 wrote to memory of 4460 4608 msedge.exe 83 PID 4608 wrote to memory of 4460 4608 msedge.exe 83 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 1668 4608 msedge.exe 84 PID 4608 wrote to memory of 2004 4608 msedge.exe 85 PID 4608 wrote to memory of 2004 4608 msedge.exe 85 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86 PID 4608 wrote to memory of 4088 4608 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\97aef66fb0cedd586c9b40e78986010e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffdbd8946f8,0x7ffdbd894708,0x7ffdbd8947182⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6732 /prefetch:82⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7016 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7120 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13367605039817118157,2332056778276971071,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD507f6f1afee63db43507f8532c3f017ed
SHA1b575671f5467bf4dea381da77dc42f4d835c4759
SHA2560f704584667c778c69133b13be67216803be4b57a50d26b4e6e90d264fe0c3eb
SHA5124aaee1a8747f3e6f89c39045e5e865bd176722e6b4c44e3ebe8ca92016deb2ebb1f8be8ab9d89e6006286e52f631c77c4eac1c4ba194c8dae5f521e22b014ca1
-
Filesize
2KB
MD505f2037f07f62270045e19a92296bc35
SHA1eeb920cc03f25a31bbb4bda32b3850ce5bdf500d
SHA25659c9dc619f3f7f6cee308868d0fb6c3002b85353d0cedd9b7eea8d6bb8a5c3a4
SHA512f3dad75f184700909ca3fd4e8d6482108f6b60d95d227f9e64f7add65847a9bb919c9b0eb906b63ccbbc276b0880be4d3b2b54a22eacfd4903577e307c076a9c
-
Filesize
5KB
MD51169b47ab10a6c1e1cd2c51dc1466069
SHA1350fec1353071269e94e9230ecea79b1da262133
SHA256799ea15a7e1a645fd6e1fcfd57fcdac245e9daeb8dcf5a54d933eb06dcdf733e
SHA512b0c99ba39ab99a30f5acbba804cbaaca4877767a32c2aae4e875f5b6a3c2dbd3f69870ea5656f55993265e324bc3da11d3a1800bdf29c3d11fe1c464e2b2c27f
-
Filesize
7KB
MD5ba983d80eddebc82b61b74394d3fe2ee
SHA1babe550b8f58f596bbaa02afebcb94bd40ebb71e
SHA256e89d76ba01e4917325f3285a52885a9ed5497f158d5aa3a63b41a9911c2adead
SHA512ef3f1af605e93880b903bd670269374ee134117a79562a94815c303f8843c56f6fa1e467008ec2296b051af32d35baaabc1171e5cecdef8b279a467bdc447b76
-
Filesize
7KB
MD5fe987bcdb1e84eb75d66b83726cce913
SHA1ca6ea31931babb8d0f93a22fc009279901609999
SHA256f8c64c7b4f5ff1e2d506c12ae1237fad66b15b4fe192644cc8cb845741beeb71
SHA512cf3fddd98ccfca6c9ad75e40b3aa9d73bbb5a92e5533b282c7bdf41bada87f3c336a2519d9f21c681874e6df68d853dbaa80a2380167880f9d885c07c589dafc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f467f47ba53eda3f11778bfc82cd2bfb
SHA1311884e7c53313da26307b991a9532a6bc651f27
SHA25612e9a89d5dff20e318cdeda7850a762009e4b99733cf50672d13ae6768ac26da
SHA512f6dd43b303b090d66bcb900abae8acf0d03a4904e382f4bac3fc627e6dd18299229e532d5f5f3371e1c6366c52ce49cbaf9fba4df9ef24234494c4c26b17b4e6