Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
ad696a6911997ab339ccbffecb100e80_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ad696a6911997ab339ccbffecb100e80_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ad696a6911997ab339ccbffecb100e80_JaffaCakes118.html
-
Size
57KB
-
MD5
ad696a6911997ab339ccbffecb100e80
-
SHA1
6597c70de9a49dc72dc2fda64c14000249c7ffee
-
SHA256
9218670cafd68b6e700014b738e500f1ee2b31d4a619e393a8ad4ea78a45d634
-
SHA512
4916b9f2b9153c8aa168d9398d9d3911d8fbe73c46f24d77cccb97b8bfc551b92aaf58dca3b10feb11046a911547449aebc20a703a84a2308142feb8a65a5783
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVrorgwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVrorgwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 3924 msedge.exe 3924 msedge.exe 4080 identity_helper.exe 4080 identity_helper.exe 5904 msedge.exe 5904 msedge.exe 5904 msedge.exe 5904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 652 3924 msedge.exe 86 PID 3924 wrote to memory of 652 3924 msedge.exe 86 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 2200 3924 msedge.exe 87 PID 3924 wrote to memory of 4108 3924 msedge.exe 88 PID 3924 wrote to memory of 4108 3924 msedge.exe 88 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89 PID 3924 wrote to memory of 2424 3924 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ad696a6911997ab339ccbffecb100e80_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdeab346f8,0x7ffdeab34708,0x7ffdeab347182⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6756 /prefetch:82⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:5600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:5608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15972842447889816735,17320977649691422338,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD5a40b0f449c1732d598c5770bce4242d7
SHA13f6401286ff67fcb77e971a94a8fd957f6859685
SHA256b7ffe9f5b09db8bc2e03543bb06922086aa350123c876f0f5386c7bc75d92e6d
SHA5126a4ce90283519c4b88a094c3f1ff92a260700e5f7132700f4e490fe6136fd624cc4fd9c4514e332b6d3836aff5e8d1da6881fc1cb8d4fdbd1e8fded89166fa68
-
Filesize
2KB
MD5054811ffca5a6a6d033c980ca58d3eea
SHA172f4829335795d663023a74fb967348a11d50bf3
SHA2562a88c0dbdbb0eeab17d042c954e2ddc8c7dc74f7efdc74362c30c0815a7c7cbb
SHA5127f1b8185fd55e30cbe58d69de860b288b4c8083a6b63716996a7bbaadf0fd062d3d5bcc1a1bbf54c2feeaab82245f1f7653402d0e0e2efb55859a16da551695b
-
Filesize
5KB
MD57203d7c09474b17213f3fad271270f87
SHA1aefdbc0fc84e0dc411b9307d0fb9eb6131aa52e2
SHA256a9455e7163a51970d9753fc2e90bc2420dae54aba3e8e115a0f6c7022875d2a6
SHA512edf48bbad1d00a812d40fa0b00b95c10e427b968a0203b1d5e852fa6ff1d0ddfa85ce56465f63ce8e174618d0e4219046c50bab295653510930b9403f7e30333
-
Filesize
6KB
MD51b247f0ce8078c99ff527536bf25459e
SHA10ffb2e9e9f81db74aa5b97245806731ef24eed07
SHA25678098d1a668d2eeccac27062c68fe03e2f9da8d8ed0a539d32fd1b22445f2b9a
SHA51258a86b11090da025ca0e6bf36450a3193981d79916c40a40492f9660608737a94950ab83cfbffc7a004416606d14126c1f7ad0d74e835efce4d5bb6aef3e174b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d8aa1088b3e83807ddb6cf3d986af66d
SHA1ae9a8b182f4a2488b309e02c41f7ab09b1977815
SHA256c11f4fc2b8f77d49476f85aea5e1fc90a34d50493339f1b71b410977d427ee1f
SHA512fb7c3538528d1a6ca68e8191a94b85fc60808df4a496a9802695ddcc8103a6b81e9fbff84293642128204edd049c566c2a4c61898b85be5248c2ba3565dd4b5a