Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
fa00b3bb161caa0e64cb10af891153ba_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fa00b3bb161caa0e64cb10af891153ba_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fa00b3bb161caa0e64cb10af891153ba_JaffaCakes118.html
-
Size
432B
-
MD5
fa00b3bb161caa0e64cb10af891153ba
-
SHA1
82939fc2ed56b0290619a3627d0613d2a7ad9495
-
SHA256
954de9b24817f03a71c635496e717733230e7096a76b3cabe5466ee592ae6b44
-
SHA512
23f01489eba13a20de6784e9fc3dd0f172c4a6b8e23327266a28997195ef52967d657b227830c4ef4ec7938e544ce9ca31a64a8489a304f6f9eb0ce78d304a68
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4092 msedge.exe 4092 msedge.exe 2012 msedge.exe 2012 msedge.exe 3920 identity_helper.exe 3920 identity_helper.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 4460 2012 msedge.exe 88 PID 2012 wrote to memory of 4460 2012 msedge.exe 88 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 452 2012 msedge.exe 90 PID 2012 wrote to memory of 4092 2012 msedge.exe 91 PID 2012 wrote to memory of 4092 2012 msedge.exe 91 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92 PID 2012 wrote to memory of 4372 2012 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fa00b3bb161caa0e64cb10af891153ba_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9cc5f46f8,0x7ff9cc5f4708,0x7ff9cc5f47182⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2152 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5964 /prefetch:82⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4542597544568100058,5013864273315005697,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2592 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5846ce533b9e20979bf1857f1afb61925
SHA14c6726618d10805940dba5e6cf849448b552bf68
SHA256b81574d678f49d36d874dc062a1291092ab94164b92f7e30d42d9c61cc0e77c3
SHA5128fb228fae89f063159dabc93871db205d836bdb4ec8f54a2f642bd0b1ac531eea0c21234a8ca75a0ae9a008d2399a9bf20a481f5d6a6eab53a533cd03aeaaa2c
-
Filesize
152B
MD5104aab1e178489256a1425b28119ec93
SHA10bcf8ad28df672c618cb832ba8de8f85bd858a6c
SHA256b92c19f079ef5948cb58654ce76f582a480a82cddc5083764ed7f1eac27b8d01
SHA512b4f930f87eb86497672f32eb7cc77548d8afb09ad9fdba0508f368d5710e3a75c44b1fd9f96c98c2f0bd08deb4afde28330b11cf23e456c92cc509d28677d2cf
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
6KB
MD529121770ef591532a23274c2837ed332
SHA1553d8bbf509f646d09effb729f11f6b416b24c7f
SHA2564e6177113a9910ff1067277410993a41b60cbb8f6b8b6bb5ca600d9cdda0af69
SHA51212ed5bf8396460e4bff1576bfe1f0ccd9e24650f0185ae1b462f677e43e4a3ca3bda541e555cf6c7aaea110c86f099ab529eb5b9b58b3f78416a6aca17d49b3c
-
Filesize
7KB
MD5575a68c089a25affb656ff2159a88394
SHA19f1e8c4876bbf9ea123d18e7a574c21aa467cbfa
SHA256c05119ddaa59e6c7494f40c3e699df8b28909a1f29ff88288e0d890250100d5d
SHA51280d9329bf3048f2c8828c8b21e8b09d207fa7c8ab7c5c931171e352ba64b8503944e2997eabd1198f0c1bcc261e47f93d48cb3af44b1594893c94513bf904afb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5b1f102fa653009a0b70e832b77322f33
SHA1219fb26712f8e91b66108f9c7ab2acda9ed68cc3
SHA2566a9e0cca571acce09b5c0fc97b87a0702fb69ab5f3104c03f9e30f573b2e7def
SHA5124010d168340fa3eb8ad17b086eed787bb7ab452f5395c6d365ae74a070e8884866524f048a3f573ce6778c6e12965580b0a7a601a861731c7e2464ffdbe8b83a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57a9dc.TMP
Filesize48B
MD53044eaee626a454a781d9c8f48546c36
SHA16dc0bf88c9dfd783a97641e4e3a8a4a83f43173f
SHA256a2dfde8d331f1e64ecd6ddc243a0b13dcbac5977bada6dabf9bd4b1242af1a47
SHA5129cd1b0dc59edfce3c0ff7c32eed3874a37efac1549a409d89924c93fd38882a56d453b56394c1879beb3334ee4699c32703da9de73d63695d09448ca124195ce
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD57ec4060eb44f1bf993817f5f76707f1f
SHA1e753924670cf96dee8048811e10fd496afcc8fa3
SHA2560b859ae43f0ef380c98b50084bc7e1da903288f7a78f66b8cfa9c7f030ecdd00
SHA512e956ca6524ec6170f0f66c4a841c7da7b5a62230fa7298fb2a790e4ec9c0b45332eb1edfc99382ce50a1b6358d9cb2eec4a0e2ec477a6d447a57c6ed38754a9c
-
Filesize
11KB
MD522c0cc376fe141398f3d903f94e56508
SHA1fd8eda26022726a15f268f2f8bf197cd325911eb
SHA25687876597804aa508abd3fccf80d9df24b8f079caf41a85a95183d5a4512cc625
SHA512cfdf68232a1741b8baa4d6492816074e924b6fed767f8e8b4d2fd2e3954911b4c88aacc1d861c7371504cc7c98d2ab8dac7331b01ee78426b6141c359a4683f9