Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 03:22
Static task
static1
Behavioral task
behavioral1
Sample
48009552f04aabc3fcbc39fd6ec835b8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
48009552f04aabc3fcbc39fd6ec835b8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
48009552f04aabc3fcbc39fd6ec835b8_JaffaCakes118.html
-
Size
18KB
-
MD5
48009552f04aabc3fcbc39fd6ec835b8
-
SHA1
49eeab7c1a1a6931e38af7c4125ce0923dbb92aa
-
SHA256
c1eea0afa56cdd499c3bd9f0d29fb71d4d939f2b8924bfed98940791db4d2cdc
-
SHA512
abdc61155f0681fb17496429e0b3e84cbba0da13eb218c7f429609417154606163a28b59beed43eb4b0d2a84c60b58aa1c53c5962870df61e89e223bc21f89d9
-
SSDEEP
384:8GFcsDPZhNi7qMP4cJhOqeVApQidvGUTwmXDViGJ32V:8mcsVjQNf2VUliGJs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3852 msedge.exe 3852 msedge.exe 4000 msedge.exe 4000 msedge.exe 3236 identity_helper.exe 3236 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 5008 4000 msedge.exe 83 PID 4000 wrote to memory of 5008 4000 msedge.exe 83 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 404 4000 msedge.exe 85 PID 4000 wrote to memory of 3852 4000 msedge.exe 86 PID 4000 wrote to memory of 3852 4000 msedge.exe 86 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87 PID 4000 wrote to memory of 4004 4000 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\48009552f04aabc3fcbc39fd6ec835b8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa30ad46f8,0x7ffa30ad4708,0x7ffa30ad47182⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3764 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1928 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3442893945298608979,12729744241148033792,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD51458f797c28b69230dede9e04e9fcba3
SHA1b5ac43f1ac464ea90b00510ecde3e66e9f071958
SHA256e4facda7d0f21a6d6f2b9364d8c185eabe6d4c14b767f6da3c8715cf73489056
SHA51259d6bce0cdbb96b859c1eb1f68d9a30d2525ecfc5878ba67112582e772f5325ed383a7b6832ca1d88b46a179489e04ad04f53d2d4bbb0176ef62124428225438
-
Filesize
1KB
MD5fe034b41bbe64705ee179bdc89ce68ec
SHA1894d1e3c1d7866f23b38ff1908cae91e8919414f
SHA25681dba44c5a81041eb8b37e69e58c106c8c10bd0fc229ff7d09192d6ae27cfc52
SHA5124e4d0a79c62fc112be908a0541cae748944623b2b0f67a260f33108a5d71b34bb6e3edc9e45c3834703169c103825e1ace7feb54641a30d4a0b62258a1c05681
-
Filesize
6KB
MD560b41d2dd0900dda87683941dba32369
SHA151e4297a9978cbedbcdba8d37e7223cba2503f39
SHA256c2b44761b80d4cb562a7c15d712c8c7b9f2636e4f1555311bfeaa39bb61724e3
SHA512a5f8092d438ce53db78e59da477bdce97c85e94ac2501db3260116a5b7a62ca2335044970e33f9e8128c6c5cdb8c72cc160a06a81d6a22054232c95d2df7638f
-
Filesize
6KB
MD5898bd9f8af46fc64814ac0c51ba8be67
SHA1f159fd200efe7a0a58f177162c06fa2e6e02b01f
SHA256f80657babfc0c61f9a8ab0e8f265414e37e5e575398c8a2f6518c46ddb1fe350
SHA51260c3d4f77de90df91270b99b55f2667444073a52dfd958d024a644e5412f7d8b39b4894277db9efdeb3db9467ffeab7390637732eade17c5024c4a4cbe4c1fe1
-
Filesize
6KB
MD5799aba8f10bbad9a5da3963a64bdbeca
SHA1abd20b2b5abd53c35cab06b2f4d6dd1d2c1e89c4
SHA256c14365531e77642ef158ee63d9262a3957b9ab8c59fb08b36749cd1c77eb672d
SHA512f6b04f773b27f8d7d2bc0ddcdf189f4f92bbe1a70aff9ed3ef52b9a689a85322ca35b15bbbe68803a93ffc5ca5edf7da914ce18b9d54375cb917fde51534d1e0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e0a974a7a9638a8a19878984fbcb8468
SHA19a9821a57c3859d8950f66d2505ea8b6280eee20
SHA256cb444d38e50d25fdb937da2548934b35a481efa5e507642616e9a2f5a77df37e
SHA51243813efe022d4e61193324147b3deae3cdca3fa0b71c3186eb8178ce594365f44a4d58f8506b39a6a67919a2bb89bb93c7fe6415ce85067b6ef9191d06afa2fe
-
Filesize
12KB
MD549e90f3734dc1dcad8b6be03f10fbd95
SHA11f3cba620521ac61e90c07fa40b7c95ed1632917
SHA256a8cd2ead8a13fe3b86dd9f710f73ddbf3aceee50f7ccad45f8a4b405e4a88f58
SHA512232e2efe4681f04978c7b4c6bac405427dc126ea1bdfc1ac7cc79559a771cb67213ceabd8707e00f995374b756b1a7795ae641c0c494e47006e5eaa9c2c8c741