Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
addf03e70b6de8f64f03f2e128d07790_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
addf03e70b6de8f64f03f2e128d07790_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
addf03e70b6de8f64f03f2e128d07790_JaffaCakes118.html
-
Size
13KB
-
MD5
addf03e70b6de8f64f03f2e128d07790
-
SHA1
b4f1d30e715b111d0170a915b665bd7cadacab80
-
SHA256
4c577bb83b6e461b9abcd8e65ffb7a2fab1f30de2e508495f6415d7ac5662efe
-
SHA512
f536454e52f1cb2871d3cb47faa48f212520e45ff4b6651003935e14c3f441b8c9c4af817ae3c881299deb0b876cde9a4508a1c905ed6420c25283c6267e9e4e
-
SSDEEP
192:Srd7mZlbLlVx5XwChvpPbqbkUqxKV0ribZE:SpeiEia
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 4932 msedge.exe 4932 msedge.exe 4128 identity_helper.exe 4128 identity_helper.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4932 wrote to memory of 3964 4932 msedge.exe 82 PID 4932 wrote to memory of 3964 4932 msedge.exe 82 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 2612 4932 msedge.exe 83 PID 4932 wrote to memory of 1008 4932 msedge.exe 84 PID 4932 wrote to memory of 1008 4932 msedge.exe 84 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85 PID 4932 wrote to memory of 4636 4932 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\addf03e70b6de8f64f03f2e128d07790_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7fffcaab46f8,0x7fffcaab4708,0x7fffcaab47182⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3516 /prefetch:82⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4316 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,11702758751764999246,601378474548601095,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5a2ef0394f43bb7b7e1a9eb4458a7d405
SHA1a2d06a10889d510820804ad481e2d26698066b12
SHA256c2edc2e3bc54f187bae0f41898d0e0627e1eace9b11a7231cdcf8e6a8d56cc44
SHA5123e4a0e032e9a1ffa64fab26f07dad6074bb3cb3e14bc4590b5682fe458d913da65a666cac46e9dc2922c1cdcccc65fb157f6fb3e7543b952bc0d6ff140620a94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD59e40cc6f69e944aa5f070bf8277ebdb6
SHA1a851e2db8e7f02f5feea3fdd7eb5713ffbaaec11
SHA256ad0873f212aa4f428dab4227b906156f9b6d526eb6eee1b1c8d8faf4a4ddaffa
SHA51291ee85cf0ad10232c0d4150caf4679c49ba68c48f0121db1c498f600b7d2864e7c3933b9787da69cb105919fadc9fc9b0c29a251633dcdac3e169425a2e3a330
-
Filesize
2KB
MD584ec384a71610fe33753b6560df78aca
SHA1be56ed304eb6e9bae7420929171e2f61a1d91d60
SHA2561c7d493b2ad130d1137bef776843b5670702c57020963a1f92b533b2329ebd87
SHA51214c9fe45d42fb51fe849a099eca573e581e933a0c26e76da85a2c390f7b2a4e0f204fc9c6cc2591b2ddfb3d3af19a7e622e1c7474dc2c87936d438462230edb7
-
Filesize
6KB
MD5404476889f633a2508b206faf64fec3a
SHA10faadac03731876117e0ad9d764b3250a0d6ac98
SHA256a2977f5bf04d54d0117907a03327dffd50c554938c233d5e00f77f37d696df5f
SHA512b88aaccf6ce6eed553ced259b77d64cdc7ea217a5dd140cb9aa449e8c94724eb493e16544bc88ace898e86f6ae95208c9bc174f4347e01777190196d77388347
-
Filesize
7KB
MD51167542282d505825acedbc6340f6bec
SHA182dfd84c4796536477ef0d3462db33e6ef3822df
SHA256c20171f3528ceb5d2168888e1bd9e12c7f5572110f3a3251325060729cea73c8
SHA512f186b988e71851f8d1128e053cc9fc7f4642d2e350eebe27d6f86a223d11aae44207a3cad4535251c98c36d30950499c6e950e8b75b4585e2d2b7050f65b5c34
-
Filesize
7KB
MD5db3fc51eb758664ed997e2c5cdeba3cb
SHA180ee6884ae85659df1437240c6f888b2437df86d
SHA2567f954f16719771a41b10dd33a01e2ab919562938d526a701e7c435a6aec0f6cb
SHA51208bfc26fb8cc1e721bef9c1d3c4e450a25034205a754e2dd771483b16b2d9f687792f21b81f5f179553c049f828ded667fefd4d2276ada3351297d6ebd2eae3e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD564d3511e5f2041703a9437655e88879d
SHA11dbf0e2cce75e6bd154bf9be0e113df8f0abf814
SHA2562318aa66a97e4ed78fc79f5875281287afd2d5d1a043a4fc3165c6b0f9249021
SHA512d06294dc55f1c99dff85180624537c55b70b48aa2b0d31fc4fae55abba948a9934fbea06e9fcbfe1503019070e5eb5559d5515a75db59920400fc1d4f020f1cd