Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
c8e960d80721608cc3e5e09b6f58efbc_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c8e960d80721608cc3e5e09b6f58efbc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8e960d80721608cc3e5e09b6f58efbc_JaffaCakes118.html
-
Size
175KB
-
MD5
c8e960d80721608cc3e5e09b6f58efbc
-
SHA1
c43c5024ce6e543887feff432770235c6a77d54c
-
SHA256
692782c7cc96ddea2dec650255985896dafa27c46004f394ba51f70714a14800
-
SHA512
1f551cbe4d2972396219d32698cc4bca477635d4a8c883bf3db34cbbada688cf907d5a1ef6551a11029c9d856cb72f0d181750bf5ef81f8c3c5c590639884909
-
SSDEEP
1536:SqtK8hd8Wu8pI8Cd8hd8dQg0H//3oS3bGNkFFYfBCJiss+aeTH+WK/Lf1/hmnVSV:SpoT3b/FwBCJi2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1784 msedge.exe 1784 msedge.exe 4016 msedge.exe 4016 msedge.exe 4636 identity_helper.exe 4636 identity_helper.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4016 wrote to memory of 3792 4016 msedge.exe 86 PID 4016 wrote to memory of 3792 4016 msedge.exe 86 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1936 4016 msedge.exe 87 PID 4016 wrote to memory of 1784 4016 msedge.exe 88 PID 4016 wrote to memory of 1784 4016 msedge.exe 88 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89 PID 4016 wrote to memory of 536 4016 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c8e960d80721608cc3e5e09b6f58efbc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff969c346f8,0x7ff969c34708,0x7ff969c347182⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13504732957511674294,9563030233294893470,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5528 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
243B
MD5c7db82144ca16a950cd398b04af67245
SHA1fd73cf7aaa7a8915e2d9346250afaa9cbc4af6b4
SHA2560ebc823b404d52928177b337a1ef2399e3fb0af014cfd82032e4e508121fe02f
SHA5122fde6fab5cda57578def49e1284bf9a78c6137b1d442b35407d07425907db230be48af9478459586533834b8120154213dc69e513f0f9eb27698f0b54fe06379
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD54cda611b521c27c3bf6622875a0b29a1
SHA13ff512b75ec0cbb1dec597bdbbb29006dbf99d95
SHA256df5f13a60193a69594d0f5e2ceeb5518ec19d8df7b43d2c63bf7a7dd090838ee
SHA51261359b6310c2c089528260625388832fad8c7fc1f3533631f8cff28b7ef0fee0440e0641f775686647681eb47a049ba81d9f3ccd1883c7307aa0d1ade2693c49
-
Filesize
2KB
MD55ac50922d29fe8a469829228aa67c147
SHA1faa1b8089857f740e0876fb3b12c201ca53cf53c
SHA2563db027d7a3223ce34bd40a602f1641198cacdd091248e23db39c2617666029a5
SHA512638371e4a7c594781bc2919ee67f20bbcb8356232174b94b3503ecb31d7ed7e11714a04662a82a0e0a58e5d065ea783190740f29dd1852cdae39452c1b13ad81
-
Filesize
2KB
MD5d14dcb8f771d161cf88d694bdf8f32fa
SHA1837d021b2a678d10bed0c8a336f0ab7732a31f66
SHA256c779cc44aca40f6827d24c29a20e63b41dd610740ca3e45c3339acf66b932e34
SHA512a933f6ec9521f6a2fd3c4f6cbe9b59198fdd89fe7242306d89e02c7de0b946c993c3aadd8ebb96e5d191eba83ced2032aa79a40c30ae40ddbe1d987e32bdebfe
-
Filesize
6KB
MD5ae623a843f73cc20fbb5f9b57f9a88b6
SHA1649f0dc17ca60ab4f65d54e5b967c8955e9a27d2
SHA256bb614c98abdddb58f7c894daefd9c4010d8425a47d8baa567f44bfe97b696fe7
SHA51211b7bff98e2cd77d890e1bed2bb9c6c959086334e67eb2b5d28e3defaff429fd57b68f8202947ece6fa5082684f5aaadb79ebb64ef7cc85a85ab70359ff87ba7
-
Filesize
7KB
MD582c1458582c27c53c8bdaef82b080035
SHA170ca094945e730c5dcc0cb84678944b8a6612749
SHA2565af61263c9ad4307f6295f1a98168a70ce5f7833ebe93f4d1845b0a3b48c019f
SHA512a9a66d7bbd35d9e8d24f2db86d65f6b5e6ef372fba6c9b5d597426162bbab50a9bf1fffeaa908cd05049ee9544f860f0ce1774494d3d2399b4d98b74888934b7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b1b0979f000f89879011c0f373d56726
SHA1ae5e6cb53ed0a43199c8aab9a4e43f91ccc96799
SHA256e56252253a9703d3e3fce6fa318220a2e730bcccb519d9148b072392d5ac5fd9
SHA512b9ff812b93def31d1a6f2ea8fb2977578b589cc136dce9d77b0dfc80643081503b39b5f7ebae4c2ee9177efeaa1a5d5f4c4ddd0a63b5923a3e7ef68dda610fe2