Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
47187b15f64eea8794473927cd7349a9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
47187b15f64eea8794473927cd7349a9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
47187b15f64eea8794473927cd7349a9_JaffaCakes118.html
-
Size
54KB
-
MD5
47187b15f64eea8794473927cd7349a9
-
SHA1
8b1b08513d405210be3145578e9fab124a99dafb
-
SHA256
088b6d04caa85f72953c948ba6401bfe9fde56b73bcdc2361bc88e935c9ec1ff
-
SHA512
56a3d4e798dc6ee8c65a7e5f2a19d14cfdcbb7150c1a9edeabfc5a255f66b2527ca0384e645302764d190640bf54ff693d4dc91f3224d0a53dda0c2a2ddc9fb9
-
SSDEEP
1536:gw7w768DDMtXqFhVKrdhVKr5+MF1vE+oF1B5upVWTWi9+EKMtL77:gw7w768DDMlqCMF1vE+oF1TupWWi5KMR
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 9 sites.google.com 19 sites.google.com 20 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 4612 msedge.exe 4612 msedge.exe 2228 identity_helper.exe 2228 identity_helper.exe 5252 msedge.exe 5252 msedge.exe 5252 msedge.exe 5252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4612 wrote to memory of 3864 4612 msedge.exe 83 PID 4612 wrote to memory of 3864 4612 msedge.exe 83 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 4880 4612 msedge.exe 84 PID 4612 wrote to memory of 3380 4612 msedge.exe 85 PID 4612 wrote to memory of 3380 4612 msedge.exe 85 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86 PID 4612 wrote to memory of 2912 4612 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\47187b15f64eea8794473927cd7349a9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8958546f8,0x7ff895854708,0x7ff8958547182⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:82⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,3350134945006629609,1704491756727038738,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
20KB
MD5397383c90a2d930f866f405747e27466
SHA17bb6b5d6cee104c877dc5c3462f61232ffe5b360
SHA256a67db01d19e15d8fa76e5a075e336e195325d79d277a83aadb6a440acf887c47
SHA5124357eddc0581e3cd6209646540bf59756cb4035d7dba47d5cb6b0050e6c202bda65721d4e9d644f37e3cd105bc5fa240574cfa96649f01e2769b796b523e08aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5bcf068af9cd9649a31274399ec8ca1ad
SHA16a8841f108defc25ba31c124162711e512f6b134
SHA2567707c9e09eb9e569816a6884882871a161e390edf9fd56170f2e5ec4f4f65a92
SHA512ca334262ac964181be972d3fe8cd7ea383df3abccb2e66fb6d5e0472d9ec90e91489a44712da1ebb95637cb191b8ce06af304eb6981a695769498e904e18cec9
-
Filesize
2KB
MD55f24584b6339e69d9c57176f2711114c
SHA1d695fba386876ab9925a1885520c3cc99f02ae5c
SHA25606e241c274dfb302dfd40a15dbff463369ed70d4383765a0059ac1b0c27577d9
SHA5127ea5515b3d6d7b5ab380b8c2c3b87e0c3b2035a8bb16e3a29568bd973264da29f97d463528a95cbc666271d88beedff2463bcb0a23329073a501fbb08b0f38c5
-
Filesize
7KB
MD56c7d8a37d318c20e789aaad5a15f916a
SHA1901daf22c421f4ba6617c1409fba253f57fd82bf
SHA2565b210d15d7b2f330409682edfa772a145f90df0c4e717dac2b67b8e605143c2f
SHA512c6f445dadaf0d3560a8721aae9b25431faf1c611b811a85dcc2fd60fa7c5e286790d4afbf2ae9a886570beba53fc4640cfc1f68ae8482dbb28747abb59cb35d2
-
Filesize
5KB
MD59ef6bcfb9b5b73673bb51e93e5f79589
SHA1d6557380dc649c05a4068eb4477f11de0f18f02a
SHA256a99229d320027830240b4909a7501f86333975fb5a92b5baa3a68aa0c208a444
SHA512cb4bd78d6454255a3be45f0b0a8023889f473f5538a321a2e8b0135152e4d024a23342c8c15520d31003a3d3ba0c5de9d780c3472f4050ed9cbf56cb4a3281d4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ff8fe7e86145793e9d77d46f47eaf288
SHA135019b3477ea5c28e6bd785af703b094107cca92
SHA256162b241c3bc8860a8a84dd967a54a19a21650824ad1ea14cdc9094e79f8a90d4
SHA512433df1a516f8a17296ac87d419c1e2c973361a92da1d08973f26379b8779594a025f593ef012c23029d5ce7afc22d0661ff83a868f0d361441be9c0a49c75096