Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
742adfcfcf8c629ebed309bc95f94182_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
742adfcfcf8c629ebed309bc95f94182_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
742adfcfcf8c629ebed309bc95f94182_JaffaCakes118.html
-
Size
42KB
-
MD5
742adfcfcf8c629ebed309bc95f94182
-
SHA1
236512a6ae1e1c33d40223dbc544c90ecfc8dff5
-
SHA256
43a38ddcc98d3794a6c5c2a742d42fcfb04bd19ed1cc6c0a66e52c9e2b65d1c4
-
SHA512
2a5672775dd3d94b720af4074f9c717d6d45b401bb279dd3877062dfbaba97c5a332f0da7a527189077a303b048299b22dafeca25bec8e3896812980b82a78ae
-
SSDEEP
768:SbYt8s4PMGpv1fWdWNaxNTGmDXnzcpjlA9vda3Z7A3Bm6Qq+idYqVevkbiICz6E:Se8s4PMGpvDeKOXzcpjlAxdap7A3Bmw6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 1428 msedge.exe 1428 msedge.exe 1984 identity_helper.exe 1984 identity_helper.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 1012 1428 msedge.exe 83 PID 1428 wrote to memory of 1012 1428 msedge.exe 83 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 2688 1428 msedge.exe 84 PID 1428 wrote to memory of 4040 1428 msedge.exe 85 PID 1428 wrote to memory of 4040 1428 msedge.exe 85 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86 PID 1428 wrote to memory of 1412 1428 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\742adfcfcf8c629ebed309bc95f94182_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc19cc46f8,0x7ffc19cc4708,0x7ffc19cc47182⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:82⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2544 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,18158288611781221013,13030647366277452681,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5200 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5818528a0e5290bc472ff3f438a7c3992
SHA1694aaeb3fdeaa45c82c48e9ab7bcf7f4f4c756fa
SHA256ecb1cb9d2e5e399e0acffc088d34ed5541262af4be074c9b96c45351e150f351
SHA512c65dddb454b127f692e0c13a3d7b543c6a0ac6a690f89f6249b2832e0d32f522393a4800b0ac8ff65e66e881fd9c776535141d4f74c42d8b2462d590fe6e408b
-
Filesize
1KB
MD5307648aa852fa870e0272ad7778a2ddb
SHA19f7875e849aa66d6faecd839f0695bfff76f6e86
SHA256a33d5e905b4d0db29d46aba571c3d28ccfc6c03a4581c8d50f7dd5f87fe6fdfc
SHA512f9dca69ea8cd19d0b80251fea1f9b2c963ea785b60c464171c4457cc7a8b50985343aa3e652225455c41e0d92cd3d38c0674871d3b44e1b447424a30c7b5ed2b
-
Filesize
7KB
MD5ad066c8add9ca91b32afffc3662cab87
SHA15b4b581cf644e4ba9e56b23d67cbaabc45294dfd
SHA2560a16569bbeeb012efbf9d8d7c2bd877e1161b72edc4aab6edee2897a03bf5254
SHA512bdc10984370d1aa81fe39e3598a40c41cc39614bdf88d5b04dc30d73b453c6a0f0cce72802c7b490eb7d93c8afbd0c722a4e0dfeab1b9b089b466cfdfd7fb218
-
Filesize
5KB
MD55c90bc8f0f13497ca9c35acd7c2113d8
SHA1a2188fcfd058f8ea039176862da978e63bb838ca
SHA256a9d2efb1078e23101c98a9c814269d6bbed567133df73c1143e21a6d55cc9e56
SHA5122c23ec4406a6c99555eb77cfc184a9b018506d72daee7aa77e00bf8bf3186fa03fc279dcc76827c9740e8acf2506fe2e9f61ab02194fff70e28eb1d2984f45f0
-
Filesize
539B
MD5ce0c2e66b34eab598d2222cb86434c52
SHA15692049f48c96e8e85ad2e49aa70a204c3fa41a1
SHA256f95c1b030d4ca2c5ac421b26bfc22269a3b416be2ada5c8294eadcfa3eef9582
SHA512eff3e413b26106f275efae10129711ed4b310f05432bd4eafca82f08ba99cbb153dbf691f3f64af7cedf9097dda8d39a8eab7904ed6282655c79ca6a29213306
-
Filesize
371B
MD54f12b1c4ff1cbb1407b42df518099856
SHA10d15410d692c6ed7b8bd55d6b468047a267eb0c7
SHA256c64915e8bdcd2ee4e0a5be112cf92cfd3e9431c11f45bb11798520572a3d3fff
SHA5127ca446abc4d116f140777a3b60db77f734362e43eff4c4821e8813d297bd4a14f019f355cf9294dc48c144b7d5ddb36ea90e4394fa769b8eb72378ad18ee679a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD542882dcdb9f0aae7c0fcda7f1c6d2517
SHA12f604d8e392ee19e855004497d3ca25d5c40f7dd
SHA256f95a11611837b3ad68ca7b71d36c01ea3a3a8754a4d8be32687b3b757073b8d6
SHA5120a26b35feaa8fbe48c0a22f8b86944932800125e79173d0379adf3aeb757fb4636e979792b766191680e8f6c364bd67cfffde58ffde078f057f51c14a366978d