Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
a8b91f1163ebbdd56372de8955a20af7_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a8b91f1163ebbdd56372de8955a20af7_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a8b91f1163ebbdd56372de8955a20af7_JaffaCakes118.html
-
Size
46KB
-
MD5
a8b91f1163ebbdd56372de8955a20af7
-
SHA1
90409fe0b5d94a536772c8125f6eaa9fdd70df01
-
SHA256
038231568ed4900d5764f955ad5f7d6cae456d5794838feaa9322bd26cb335c0
-
SHA512
8a0bade439acd58dacdb242d331b72954b29233abf4793d588325d9d32ae654a78c256cc7cdbaf77241792e0a325f7cd980f4ec9a5e2ac68a6704ddde6ca984f
-
SSDEEP
768:ZW848nUWEjX9uWO8ck3tjOV3jtdrWaNiAOkTVDeJNieMbQ4q10drp0AXSXinIHIm:ZWUUWyX9uWOG3tjW3jtdrWabRDeLiDbQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 3428 msedge.exe 3428 msedge.exe 5116 identity_helper.exe 5116 identity_helper.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3428 wrote to memory of 3860 3428 msedge.exe 82 PID 3428 wrote to memory of 3860 3428 msedge.exe 82 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 2152 3428 msedge.exe 84 PID 3428 wrote to memory of 1700 3428 msedge.exe 85 PID 3428 wrote to memory of 1700 3428 msedge.exe 85 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86 PID 3428 wrote to memory of 5052 3428 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a8b91f1163ebbdd56372de8955a20af7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa025546f8,0x7ffa02554708,0x7ffa025547182⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1720,11270617261006665898,15092687762994501590,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1720,11270617261006665898,15092687762994501590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1720,11270617261006665898,15092687762994501590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,11270617261006665898,15092687762994501590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,11270617261006665898,15092687762994501590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,11270617261006665898,15092687762994501590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,11270617261006665898,15092687762994501590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1720,11270617261006665898,15092687762994501590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1720,11270617261006665898,15092687762994501590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,11270617261006665898,15092687762994501590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,11270617261006665898,15092687762994501590,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,11270617261006665898,15092687762994501590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,11270617261006665898,15092687762994501590,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1720,11270617261006665898,15092687762994501590,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD58eae04f09e1295e968c5b01d344e500e
SHA1fba6d348a27cdf831a44f684f10144a9681281dc
SHA25649a807d10243114993c0aa78704cc0f9e1c63233c74ee8174412f7bd4a42f138
SHA51241890fe9770ff36782decd17ccb1e95ad7bff86478ea41d63e142dada6a7ca038a769428cfd50ca0267abfa63d2f7d2585fcc9058cf40781923f9d5992a96fdd
-
Filesize
942B
MD5aecfcec4df70771c83443ef628dbbb80
SHA1a764f2dd64d5f6557ffcfa7ba6944c8fcb173b63
SHA256081780fcb95d20d06655ae442c5a483f2ecedbac43f4fa642b1656aa70417359
SHA51270ecd036495b805d1d1cec2753b7eb9e103bece332b7b5f12e0f565067d0ee0903304530713fc0f2ed7c7c47149b52af5364e860b6e42a9cd78c0c267d7c9489
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5667965cd4e22abf79010102668b48d8c
SHA1cf67bdbb8b8ec5913b0f28b1cd7a4c29415412d6
SHA256104d1b195c9fb4b729f3e0b8de2211627249539291cccdddc18ee0f66cd6c226
SHA512736960445cc85cf4a4ad1e56afb6db0c8e8ce746219d0cd4b567eb91ecc7ede9702d97248e7ae5a6f736c711f66a5995824a000117ef2ac3bd5f22ac1614b67f
-
Filesize
6KB
MD5ee5ebda92c63b703fe28c963ada6245f
SHA1680bc8beb2573641bcdaa46049b7b4906fb91fd2
SHA256fec032abc2e5537fb1adea35fad5ab6cca367bcdfad397082fd483517a69952e
SHA512cc1ddd7cd2238803272a0feb97855bd03fe5df3f8f3a0076da5f753b9836bfd1e9f7b5d6adc520d8687d26c4d3730e4c14ee48fc0f5bb459eec3f95b50a433f9
-
Filesize
7KB
MD5c319624b4653108fc00b990e1b987424
SHA1689f3e0b361c574fd9f58db7fbcc711234ac0631
SHA256077adb689d6979940241cbe3876ee6a4179f38be6a566b0a51f4bf8467a207bc
SHA5126c6dacfcd2dfa4614f4d91cc344d2b491dfa41f5af46218ccfbbb49ef82538f9c7f77e4882cb1bef9d28b71f9876146460e4dc964559e00b9ae79a0bc46210b4
-
Filesize
707B
MD52c432e1a8d752e5ba2c3722bce179823
SHA18f06cc08d7fc89be0761db225a42cdd0a58ab1de
SHA2568226a4eb1e3a4d6514bb2c9d86f2285088d55eac413ef7051d136eff6cbefab4
SHA512f6d079447f9de0667fcb44bad0c277f167c20bd5cda4ed2adb9c2a8118dcb003d8619cf9543674633376fed2a2e6dfec575a2b49e9dcefd413566728a5c3db39
-
Filesize
539B
MD5f915eae83585f918051525cbb2d75bc4
SHA1246f81b4aead24458a685b3738ef5eb27d720637
SHA256fb52943a038798b89fe59574ab9407c9d25a127dde85c5112756c06ab6f3db69
SHA512054f833385b3132228c9015e0d8b1d34c845742582f9ad3d1d192e2f587d6fea5d8d4ef8081dde27c371d9cef16a77b9a09c30122c86bbd87482b609dff94fd6
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD50288fc9ac888c53fc727a399c6c9eda8
SHA11008cd248924c317830fc8bf08a0c9aedd7cfdb0
SHA25620cda161bcc7b2ab972cae462d78571438bec28647e602615effd6a151c5d8ad
SHA51284fbaca311f5c0210e5f2ed820111a0bc7b2a763750794ffa339799f3028ead33530640dd5c2902c0dbc22113a35a2ec5ff2294c88f7c20b55b7401c0d7afb1f