Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
3a5002ec40b178a99eff1316b6c1bf6f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a5002ec40b178a99eff1316b6c1bf6f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3a5002ec40b178a99eff1316b6c1bf6f_JaffaCakes118.html
-
Size
29KB
-
MD5
3a5002ec40b178a99eff1316b6c1bf6f
-
SHA1
6c6ea1ab3062cf979db2e30deb1ad40b67df4d3d
-
SHA256
5018349ffc3052957cb82a92acfe4561e27cd03f29d4e7b4825eb67e68697c6b
-
SHA512
30d86658418a6b2de66f0794e902e46def656d3c34d592c630a288f2ad056480ae7497c59b9ed02832d363829ef1f772f2055fa87d66678fb10c629c5d673447
-
SSDEEP
768:VSt8gnvwyUf/JyzyS3FVDVQkVz+RAgxIU6UM/w4uHQn2UscJ8tY:VI8gnvwyUf/JyzyeJQkVz+OglBM/Dk+/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1960 msedge.exe 1960 msedge.exe 1600 identity_helper.exe 1600 identity_helper.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1960 wrote to memory of 3652 1960 msedge.exe 85 PID 1960 wrote to memory of 3652 1960 msedge.exe 85 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1476 1960 msedge.exe 86 PID 1960 wrote to memory of 1656 1960 msedge.exe 87 PID 1960 wrote to memory of 1656 1960 msedge.exe 87 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88 PID 1960 wrote to memory of 5052 1960 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3a5002ec40b178a99eff1316b6c1bf6f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa00cb46f8,0x7ffa00cb4708,0x7ffa00cb47182⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9842661892468490262,14809907430173900649,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,9842661892468490262,14809907430173900649,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,9842661892468490262,14809907430173900649,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9842661892468490262,14809907430173900649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9842661892468490262,14809907430173900649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9842661892468490262,14809907430173900649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9842661892468490262,14809907430173900649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9842661892468490262,14809907430173900649,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9842661892468490262,14809907430173900649,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9842661892468490262,14809907430173900649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9842661892468490262,14809907430173900649,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9842661892468490262,14809907430173900649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9842661892468490262,14809907430173900649,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9842661892468490262,14809907430173900649,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5e8d5f976281ecc4366f067cad224e82c
SHA1b3ad96627a4a1afc879b3ce4c4e924d456c3a290
SHA25609122fe4f45d5c732c81e3bf54ef804941366394951009cc379954c529e2fead
SHA512d5e437c8bbeaf823bdfdab1321757ee7185c3196ceb8430a62c624bfc945283a06afcb1c254f5873d9c4c7c69f90826de0421701f57f61a3ce4ea75988db2a77
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD539187483d8a344154c5a835d7e97602a
SHA168ec7fea3d89acb3f41d6c46e1c1c4a0239ed146
SHA25630cbfe8cf8810d21a72e34bde35b0badda590544d6e79d541037d7d430c8aaab
SHA5124dac4215d5e6b8a3ff087fee9b38eb488b6f8fc71c71f3c9e4e0bc214d1ed076a1256144bb1d3d4aef066d891bc228887e9ce24e399877dc6c38614ccc4a94c3
-
Filesize
3KB
MD5cd59f6439283c44cd4259019dbfc99d7
SHA1b26cc18d42cb01a494f8a534fc455bfec16eb0f8
SHA25630c30a6af0f4fc36bf8bdbc383b20f46d95f2d9f34e315880803e89893c32c5b
SHA5120b7ef512b9bb1678d6a63fe1d9ba176333818d2b4e864afe6aa1482e04c1977de605b472fad6d129fb6d916e545040a7010fe12a37f0fc71edac148c15891a7c
-
Filesize
2KB
MD570221841c9b995cfd264562b3b9ba59c
SHA1f4b4b047524cc37fcd8c789fddc84ef879f6b1f0
SHA256b21efbb78ba20c68f7fc7e86d1dc296ff321a02f381956e38874064ed7badedf
SHA512bec7723fef13f887b6564ae1457f5f0db8f8a0885c0be06dfa70063614d184df907f2e57b7aa63aed3b55912efaf2ccacb8fe5e9df96802e7cd3d07a5d57d3ae
-
Filesize
6KB
MD581325999b0c9628b09b97765074b97de
SHA164c4b766a7fc5205593c8d04e4c98645d045333a
SHA2567756f97bc0ca2ae163e7813359abbc5badd7da9504cc7569357571f85768f6b2
SHA512ab817b3d88c4725b07209e9db31882a52190c0335f29f24c8d911f93b9be0aa534526b046e6a816da37e5c592cab3a0ce3e2edc79298c003dcab35a2544df540
-
Filesize
8KB
MD5dae689c9a442365e86eab2f3bb5e4458
SHA13056d7cc842fb4837ece6f7b7bea443f533ab80a
SHA256e7a15e12134cd96e6bd4382b6f0ccdc87b2b3d7bbcfe47283862a648b4177f49
SHA5125aac0858b9b6e1e61bce17c770636d9677d3b6ee605d21d63f176a1d34bf41b22dfdb20cedd7edcba4ac0cf99371d51ce45830d492049347684ae0874e5b6ac6
-
Filesize
200B
MD5e8e9ebf67d0e88d2bc38efd21de499f8
SHA1865c62ae55dde8b05d1ac5ead668ceab485b4bd1
SHA25687cc17312f1fa4a16ce16acfd1b8593d645967da47a0b649f45b73005cee1263
SHA5129a9813777cc6a1935e5b5cbe54d9c919efed0d4af6dab6249a8ee1e373df552dbc1abba3cd9f5902d60ae7bf9ca658b74c922ca46f86f58c6a50dd0c1c27ce21
-
Filesize
200B
MD597b33d40dfee73b1b712d5bd3e695253
SHA121cae6b2f92504bcae9074162b49a70c46d9b647
SHA256f053a6af3d1569501810ac4829e444e103f51875f9973afbdaf57d3e40a4070f
SHA5122761800e1f2ce54c99bb908db791c1cfe69cb572bfd22ec29594367001c1dc0df7054be04b5d48fc7ec20093976aac468040a9b71039b576f2e849612195de8b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54e53cfb62c0cb1ab107fcc2093bc8ad9
SHA157cdeffea6ca7290a1cfeec567d3b5c58317ab7e
SHA25604d748026d007ee4f9507a82662e62eda9ecfebe372247b8eae2f9928c905dc7
SHA51201dd2cd02f6f3012508c86944e7ae0746c39607641829f109dd996fc4a4b05bd82d5f8ffe92c015efd41154f45cdf60cda341bdbfeffd554c1bad867e0b7bee1