Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
d41c2a6e0eaea95800aa35d256f9fe3f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d41c2a6e0eaea95800aa35d256f9fe3f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d41c2a6e0eaea95800aa35d256f9fe3f_JaffaCakes118.html
-
Size
49KB
-
MD5
d41c2a6e0eaea95800aa35d256f9fe3f
-
SHA1
23740f4f50e6910ad5bc24755e00a5a9a7b314f1
-
SHA256
617cec0e6dea7fd69b993d7b52ec51a0e54a8a8c34b3cd3bb76b9d94862af617
-
SHA512
7e250e30875b9b306e721a0843d34ed39476c2b1668df69044efb41f1f946a4bc4ef0dd11f118c7041a640fc5a31cab99f42cfd46a265198a660468a219ff330
-
SSDEEP
1536:WBR43e1fjxlPV1df5+XG0E2RM8T4n1UUwFtbnC2JuBrbLTV:WBR43e1fjxlPV1df5+XG0E2RM8oyUwFS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 4420 msedge.exe 4420 msedge.exe 2668 identity_helper.exe 2668 identity_helper.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 1476 4420 msedge.exe 84 PID 4420 wrote to memory of 1476 4420 msedge.exe 84 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 4004 4420 msedge.exe 85 PID 4420 wrote to memory of 5028 4420 msedge.exe 86 PID 4420 wrote to memory of 5028 4420 msedge.exe 86 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87 PID 4420 wrote to memory of 4520 4420 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d41c2a6e0eaea95800aa35d256f9fe3f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba9d046f8,0x7ffba9d04708,0x7ffba9d047182⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6688 /prefetch:82⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6984 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,8213042465256992449,9083570888425836439,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5c9df74e0bab07759a96b163fb1d2637c
SHA125532a4a73d0cf88180ff8bb232c114acd6926f3
SHA256254b95bb4385eda2ecc698aa2d5b8628cc2ecbd9a08e6b5e0dac7830165a8f73
SHA51220456ce3fa3a61e1cd4ca3e070f1d682392144879ed14ab1c921de6bfe4e58909d51002e36267baf2e651cbbc27cb6fe402ada87428403cb6209b8172b4174e5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5c9f82317dca38f125e6ddb06e16bc982
SHA17650ed4baa1e67eae3d75a19cd28fac7797cd345
SHA2562e8e396715aa772f32d2eefa9d978e191b927933658a65a40e891b9ca314c645
SHA5128015476d2d5171a817a2ab74838c18cd1f83b07b8395a64ba81a2cf3593b2049149448fe2129fe3d565a195912856104cc69de2d26358c68c67bdaf18d90d6c6
-
Filesize
2KB
MD58b069cf383ee223c29456968c3012b6b
SHA1247f16228fc8f808800cbe0f2a1532d8141dd891
SHA2562a9b265e985ee0bef74e05ff93ef33e62925bd0de65402b9e225621b2b369d0c
SHA512419688320241c1a4df784c585f68e34aed48a099fbc7bcab65716b070f583c795b3392d9e471b65f166861a0ed9935fa71e984650577af7c6af7eed2053abbc6
-
Filesize
2KB
MD599a0703a8aa9f14901e8a2c7da1a4532
SHA12642daa724ffc2e3af800a6ad1a29e37af5ecd4b
SHA256c0970098373a3d9aa03ba9881d14d89055178409acf1906a6a3c4a89c7a92af1
SHA51271633cf306afb3206d17f5bb14a1c8104dbaca28c07bd7655dbc1bd55d1df2f179ac6d6f75e13cb9172acb5c8d8e963c1b7abd75b5a83362158dd1b4ecbe338f
-
Filesize
5KB
MD545783e301f2f7cfebcfce8d6601f78c1
SHA127aab42ee406c2ddaeaa61e37dae07b0d4efe507
SHA2567209cb0205baeddd33caef57d64a33c6591570b7fd78ca156bd58cbb6c4dfb2a
SHA512044a896b0de5ea50def06d7f9e7b493cc767e61e0ee1e9b84762f6d0a2f1ee5c8fd833837dcb412f5d3349684d29749c47bd4c7190c0f116dc74c9f02e04bb5f
-
Filesize
7KB
MD54f41a7a6d35fd89a27a106c5b002ce64
SHA177a9bb601fc9ae9875489260b999566e4dfa361b
SHA25685a12829bf4faedb43af94b3842fe4fac58e421db235284e8647a4755f33f4ba
SHA512b620f2ae57b9610eba1eebbce492b1b88f6faee7a4885272c78f2f71ed2ee0aaa34c0103684d47ff17bd3544ad75bf15019c31dcfa61dd1ae13c5b90db59bcbc
-
Filesize
7KB
MD5197970576b9b1316f3312a0c18d6eecd
SHA1b3eda4124796e21878922018107a3fbd78a46fc2
SHA2563a9040ac2b74a20c1902afb0b8a1ec779a60c8d102abbdddb5035298aa67d406
SHA51244d75e683e210e3df0d7d5711c7531fe274fc930713153fddf906d3c3af3842ca12d42268c7b957530e5ad2ff41fa9a6162aad0b8160625af822bf1de9f57363
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD596a829f22480aa97b95f3d7f147c6224
SHA13e9347e7348afeabd0c63797d799c74cb7d28145
SHA256b09019cc2d651b683b676ad87c836d80698e1e5095a50bf54f70d0d54cf86f99
SHA512eb37f4a748ab9ca7b6b0002fffd82b00d8bd8783dba096f8e05f7c14c458e42ef4d780ba87b59b61f81975ec17d9396bffbd8d232cfb50e1891ac7766bef46df