Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 06:55
Static task
static1
Behavioral task
behavioral1
Sample
6662ed2f9228e939c5041aa76afcfb22_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6662ed2f9228e939c5041aa76afcfb22_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6662ed2f9228e939c5041aa76afcfb22_JaffaCakes118.html
-
Size
175KB
-
MD5
6662ed2f9228e939c5041aa76afcfb22
-
SHA1
ed6ffef6b0340930247db1096053ba9b320ffb35
-
SHA256
80e4bd59d6c95fdc479216e5e00885ab93fd65a5f5de1b6eb0d7ba9d576def89
-
SHA512
3ef34c87a9545ecad984baa9dc3d7c2f20a680480e0cb02d85cd1b5d257a71e665c9efb80ac38485d060efdb101418f558213634c616af04d839925a6289548a
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3RGNkF5YfBCJisd+aeTH+WK/Lf1/hmnVSV:SOoT3R/FcBCJiNm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 536 msedge.exe 536 msedge.exe 4976 msedge.exe 4976 msedge.exe 880 identity_helper.exe 880 identity_helper.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4976 wrote to memory of 3452 4976 msedge.exe 85 PID 4976 wrote to memory of 3452 4976 msedge.exe 85 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 4892 4976 msedge.exe 88 PID 4976 wrote to memory of 536 4976 msedge.exe 89 PID 4976 wrote to memory of 536 4976 msedge.exe 89 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90 PID 4976 wrote to memory of 2700 4976 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6662ed2f9228e939c5041aa76afcfb22_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x74,0x108,0x7ffd150d46f8,0x7ffd150d4708,0x7ffd150d47182⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 /prefetch:82⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,4173744466105607797,8452084358797133631,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
46KB
MD5c60bdf1d37da6ba7172678ef0e433524
SHA144f277dafd09e0e76c2ce61555db77f8d7a5ce1e
SHA256096c78692fa88dcdc47ae22c67e1ec55426c5f20f53f66ea55da7c8ecb1a4eb0
SHA512e26339c6bf6dbddf9cda7a4ee1e49d48acc402c54cff5518f7d0bc9548dc668fff3ef6179abc354c7470fe1c5125abe5edd38824819418f80778a75ea0477099
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD50f7d19ace124d5f7e7de5e175815b9f1
SHA1f17bc574141f3ec0e0aee575bba6792603bc7aa5
SHA2561ed2b92081e53ffe33282842129f65c860ebb5951eaa060da6b5200119a9eb75
SHA512e873d40cb06efc828cbf97b6937e80391a8280d44f909e3e289d87639d6b75e27d46c956ad991fcff61370c6e9d51ae63a9bbfca9fccda5f432ba178385a2968
-
Filesize
2KB
MD5257d08c0e1f2e4826d022b4b495ee880
SHA173d28f800c34c073b52c15df6081474a90c6bd57
SHA256c39d77946fe33564991d0b98c31eeda24b8638af45411f37918859e0b2bec323
SHA5123b766d5407dbbee6554833aadac7a3b1840b6455fb972b8b3ccbdca298e4c0d5a3f3dcc6580404c47cce726cc6e6c8eca7f2d866644dfd30deac22e8edebd909
-
Filesize
2KB
MD50ccca0cc09f87d25ca94daf252ef3cb1
SHA1f0768fb60e87742007babf986f829ca8e7aeb907
SHA25662eb8d2dec298cd0cddf6da6c3c1349b5f7ccf9a9fb27cfc18dac93fdf7dfec4
SHA51223a95255817faf3dcbc8a07838c494dd845aa3e868c73cd7c527b4144bca76a6d90b302313bcbd8e4fba56fa3a7d931cc0a5e1a0fda83e396f42f5ba91a19c12
-
Filesize
6KB
MD54264ed88cc2b6f8ad6fc72768ef70088
SHA1e2029449b133dc6a58ed2660343be7a7e418e101
SHA2566e49caa98fb76623b6889dcf385b07c575c426751a49c373a38c2cbd03714335
SHA5126a6b11f46d3101ffc23f7f5823637c17e7cedf009c13c0c18282e85ba887fd6abaeb49281644194efd59e26529627cbe835cd9301ae1ecfa83b4cb85f696b7ff
-
Filesize
7KB
MD5a143862a796a1b8679c6423d93c8c249
SHA1cd298bd71270de1ded670a88fd3ad555b7f93214
SHA256cf12fef6dc50c0cbc75163dea5bfde19cfa3ec52c3598d0adc53727c21d10607
SHA512a695e5796d463463cbfbef4a280a738fb16360745f85fbeb54415fedff355ad0be3127473cab0874b73b5f295e43211e7240ca4fc67807352fab19a4c258d3ad
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5daa3c6ebf835437cb9cca6782beff20d
SHA1614ec7894d58928c688dcdb4d3bfa69622d1b158
SHA2565695ea66603525277a169f9ada6577820e48362a2a054ddcdcb38ded01e486cc
SHA512a51b272b5f656ca980f90b6529e7e266739e42e8825d542941113d876605c53e13fb6409ed936ffb09c8892298be104c6950060d61bba2405eab1d8f9adb2e44