Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
87f8e3d6d5ffb40568cdb40f475bcdd1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
87f8e3d6d5ffb40568cdb40f475bcdd1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
87f8e3d6d5ffb40568cdb40f475bcdd1_JaffaCakes118.html
-
Size
790B
-
MD5
87f8e3d6d5ffb40568cdb40f475bcdd1
-
SHA1
5b7be6616d73f3683a6a5a2988b3e496826f77d8
-
SHA256
e606659a4aa714f80f7ee11cb716d8bc1447b5866c3b4909641acc6ef17e12a7
-
SHA512
c5600ad6249bacafa16c88bde578ddb2c7f2122647bcc203398e4aadee90bb9ee55fe95fe7780746e1ed897ead4ca73943aa3255a5f85f4e4b25481cc09e38cd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-711569230-3659488422-571408806-1000\{7847BB95-FE7E-4586-ADA4-8D40F460779C} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 4408 msedge.exe 4408 msedge.exe 3992 msedge.exe 3992 msedge.exe 2224 identity_helper.exe 2224 identity_helper.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4408 wrote to memory of 548 4408 msedge.exe 82 PID 4408 wrote to memory of 548 4408 msedge.exe 82 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3792 4408 msedge.exe 83 PID 4408 wrote to memory of 3100 4408 msedge.exe 84 PID 4408 wrote to memory of 3100 4408 msedge.exe 84 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85 PID 4408 wrote to memory of 4428 4408 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\87f8e3d6d5ffb40568cdb40f475bcdd1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ff8930846f8,0x7ff893084708,0x7ff8930847182⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3256 /prefetch:82⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3828 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,14154053482929624819,2061011134761014091,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD53ef5eda226ec9a51d933604f08a51be3
SHA13bd11f363b76eec9b9ed1552fdc1a2b635bd1f93
SHA25645a08067a8586a2e7210e9b8b826ed0d15bfd003deda2d80017990f162daeb08
SHA512df9c8a2c87f82263357c52e761dc556bc64cd883a204c433d41c8ec114f69e3bfaf420dad7021ed34948c23d78c7b1331f0e74e4a7c8c845b80c3feba4fbc980
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
947B
MD5d50f580c7c32409640e69758ccd1d142
SHA1b1b90eef904e57e99b2295e41f77f87f0edc1daf
SHA256f38cddb756943fd9c1ef3f4ce315a091e800c7a88dc602ee85fa77594d036bdc
SHA51200a3a2e0d49598070e663a01a314a5d389e7e94429f66464aec4ed6612cac4f06225e92f7373b457c51ee94075e0e6f5c1b22ffe5714ae1197b627ef8115c749
-
Filesize
5KB
MD5db4c010089f19a163844f5af8d0615dd
SHA164aa32a0965509e506a7e88610ba725f238d71af
SHA256390e5bd47b3c11785af6dab74bfe8a36e67ed43161796d7802dba64793989027
SHA5125950ac5e5eea8a5a93596992622d560927439404f87fa4a4d1417da94c5e308e9431ad9eac07d02cab73482fcd1d33d147d412abce0fcdfd6048c66c1dd546da
-
Filesize
6KB
MD501335801787887234d29d00f3218e7e9
SHA1b45bb619ca9fed92cb750bc261437e1d6741fac9
SHA256b31782d47f5b30ebf5d479f13b5acde536c247f5893574e7bcaadf0c8520dff1
SHA512cb7dc1e20b9d47204aeea74a0085cc26fdc3b8e3b9c44b942d89d3066abdfc23560a3227d8d31d99846c6bbb7e3d70cf7b572da9a92ffa9844242eaca55e285d
-
Filesize
539B
MD50416bbec3dd6b99c6b204a284234638e
SHA1fc7fd6c748755025af4c46e291a600722ed8e66f
SHA2561fa18518c6d94d3dd3546cb94c5e0bbe4b2aaf03a6d327b9d12376e19f4e5472
SHA5126109a3ddec8c482592a5b0f0c699b345f71b2706dab2fc66e99f8b8d49a4b2cb1e3f3b0194e2a6cad5eca1f1e9f9607660f7b712574789faffcc1ca50a760c83
-
Filesize
539B
MD5c5ddff7104e8553cc124660d32a195a2
SHA180d478c32e6534a0e1d34c76ed29a571bc5321bd
SHA25623387f13d67d46cbcb083830ad0e8439299617fc5091ad4aec78ad73ae3d6858
SHA512a490c9a52c2209c815e80740ddd74850bb6adbfd2f4f4673ea3fbe044498aa286aa406458f3790c6a5e3bf18b4098842d4b504f452fecb27bca8b6e97d958b7f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50d1324066b0b7e3a8994fc44ddb8a3c4
SHA136c2297c0284e64f7bd1305e3e6be096b9038cb8
SHA2561d17cb941a4aa2e3dcecf786970e21a8502538c5243f6fbc10ec003b8068b038
SHA5124da7f2a45e20c3ef53b75c3072429809d36d286fe6a360493e012162e0a53cae08e3d2ef534049033adfe9fdf937e3f025b346cdaafce3e956a95c7ba1924115