Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
68f1a9cae0011faeabc23cdd31579531_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68f1a9cae0011faeabc23cdd31579531_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68f1a9cae0011faeabc23cdd31579531_JaffaCakes118.html
-
Size
175KB
-
MD5
68f1a9cae0011faeabc23cdd31579531
-
SHA1
22edc63b2a520e96dc9497cec7df4aa3c27a5b8b
-
SHA256
94995b69551eeb205c15f6b4ca8aa1ca00d08d7edb2afa951c14a1ce5eb4b2bc
-
SHA512
d35d96dbc9fc34228a1246bf558cf78b9105867643c765add32c845f74050aefd3a1c9cfe8ced06e53781bc727f3c381313f3cce2baa4e0dbbe03706178fe738
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3HGNkFeYfBCJisr+aeTH+WK/Lf1/hmnVSV:SOoT3H/F3BCJiHm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2752 msedge.exe 2752 msedge.exe 1056 identity_helper.exe 1056 identity_helper.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2752 wrote to memory of 208 2752 msedge.exe 83 PID 2752 wrote to memory of 208 2752 msedge.exe 83 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2108 2752 msedge.exe 84 PID 2752 wrote to memory of 2340 2752 msedge.exe 85 PID 2752 wrote to memory of 2340 2752 msedge.exe 85 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86 PID 2752 wrote to memory of 1524 2752 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68f1a9cae0011faeabc23cdd31579531_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffffab46f8,0x7fffffab4708,0x7fffffab47182⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12269787895345885637,17482826850818275720,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD543580289beb2042f95b93d6ec404fd8d
SHA1797ee10f0444ce73837aecbc06f3796111b8b16a
SHA256f8aaeedf014f9f43fee6244fc7c7364bd44c7b096d7aa59437f3a470d9bc34f6
SHA512756a29f2eedba61133bca62a5826b1ff1182381829735f9755917fddc077caf8fb0c3e27956f0160e91853d15dbc18f0792f04c15c2792a464d56f1eb93bb516
-
Filesize
2KB
MD5251f19d6863d469894321b2e1c5a4720
SHA1348e3bdc5c07af31ec10f43a41fa136193ab20ab
SHA25623d006795cb661077988d126d51fe2fc8029b0192be0b76f0825008a1eb9ecf9
SHA512c59020faa5f72cd634720e6b65cad9db82e69314690b1a4299db3db8a63f9807f37266d441fe3d7ada0c111a3dcd21aaae74453caf68fb26ab335ba8d318b352
-
Filesize
2KB
MD5d0d43c4db23d8bec449266d3d1159fda
SHA1cae0c14110521476bd045b5ada5ec31d85e2184a
SHA256dff08f33b987a8007f829d3412a71bb500d51305edb1dc9eded07773e9b95587
SHA512a1e03eeb3d8dcc6a0e1c06112561545f6d68393e43bd28e8c15f1466a6e093785be9aeed44e6cb3845f03f4d25b70c7fc9e2e30f90a4645b8e0f2871e8c3c8fd
-
Filesize
7KB
MD51852f8efb86cf1468141daa0ab9a15ce
SHA19b8a7c5fee204b7f9c84d9ef56c90be7f71d58cb
SHA256c629f5e795d07b28e8805b5947c000410f47e268bdf58472ad37ba1a854bbf01
SHA512b8420d711ca83be4a561be15afc9224de0d1c8253e8291d44ae28a5eb8b69f283a7312e46a154153c57f6d1ace1d6d6719343a308577e4e820e50c48f43bf373
-
Filesize
5KB
MD55f6c8f59ee820887051a7a2ca25b9bf9
SHA1579de4fd5be94822d3983a0eb868339c4380a385
SHA2563379b20e4f0d96a81c6fdfbb57eb2f85c7dd6a4c6f53345ae9fc6a93ff1d8a1a
SHA5124cc8bc47d7b577945e5d7309a46442e4aa88b39871bf5239ae0c76174d875831a89ea0da6f1d94b4c000c7057db35e70a47d420e905670fc338a8864eb839775
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\000002.dbtmp
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD57a86c11513675608be0cfaab247b064a
SHA1692dd78ff3a22c5643e6403906d3ed33118c61ab
SHA25668768aad8345448e89d5eaabc5470c55ccf02c13cd77106de66428ad5619bd39
SHA5121de3ff21455e946c471260629d7b4ef324ea8de29a173a08e4cf28506f70d99f0fa16956a8375782cdf548ef490e8c94cc3e094680d51c040242a48aaead0620