Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
91e3ad55db8f7ac8dccc0039b8bc5283_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
91e3ad55db8f7ac8dccc0039b8bc5283_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
91e3ad55db8f7ac8dccc0039b8bc5283_JaffaCakes118.html
-
Size
175KB
-
MD5
91e3ad55db8f7ac8dccc0039b8bc5283
-
SHA1
33a9b05a72b64ea37b5bde2a50e30841805ab107
-
SHA256
4884b0a38b9cdb44f4ea4a371b0d826c61582a021e3b4a2913aae3ffdbf8e626
-
SHA512
da80dc2348da6d290486952b320094d126dc99f1cff4fa26af7e3ad47809da96f2a0ceba4c341856e369d16217c188b09aa00b5fe6352cc782a2a500af42537a
-
SSDEEP
1536:SqtY8hd8Wu8pI8Cd8hd8dQg0H//3oS3AGNkF5YfBCJis2+aeTH+WK/Lf1/hmnVSV:SBoT3A/FcBCJikm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1000 msedge.exe 1000 msedge.exe 4876 msedge.exe 4876 msedge.exe 3168 identity_helper.exe 3168 identity_helper.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 1104 4876 msedge.exe 82 PID 4876 wrote to memory of 1104 4876 msedge.exe 82 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 3236 4876 msedge.exe 83 PID 4876 wrote to memory of 1000 4876 msedge.exe 84 PID 4876 wrote to memory of 1000 4876 msedge.exe 84 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85 PID 4876 wrote to memory of 3040 4876 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\91e3ad55db8f7ac8dccc0039b8bc5283_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd711f46f8,0x7ffd711f4708,0x7ffd711f47182⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,8673810175032829099,9265573251514776862,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2672 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
19KB
MD50f0c9989cbb18447d2f5d954c20ed99f
SHA19ad0fd560c0c478c67cc8f118e363b3a1d1cdb5a
SHA256a43a9e5bbd2d8a8aed070df3b2c799afe064312d6f248c4a498a67c0f9a02720
SHA512ad6a2c60d3e5aab48497169e380d0fa50d7a0fd2bfa0a07313d880afaafd2ff2be7521864ab7ec661866b1ee4309467ef2733a24dba7e0facde8d190739d9fa3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5d933f15109b855d3035bab9e47b186f0
SHA1a1e98d410cded859f9a3086f4f43195748f63c37
SHA256e6f17e7391227a4e7132516b260150d8b03bcd06e10de8bf454230146b19b593
SHA512e0d3fa8464d4462bae4e703e6f21ffb4409d2dd508f2c26afbdcc1ceb51747050132e855cd9b7eb277b66e2451da35701068f168df3d16d843e1922bb1585e73
-
Filesize
2KB
MD573b1c7be8d5a961733f88d9d27ca9334
SHA195ce092ae242e3e077ca35dcc377d0e0415e6362
SHA2567c566635de950a17561829f0e67b983d0f462086700e07d6c7e9c42429ff617c
SHA51279a328294893f065f110d4c8e5aede547b20576c100a9bd78fdc071c742b87b09b71e8a23ef9b06612c9b8df03d81611d9410fcc8769b08c43a991301c5f915e
-
Filesize
2KB
MD5b9253f1f6f307cd4052b297980e8e71d
SHA11b1f6defcd8d341e3fdc75eeb2a0ea1708762919
SHA256e1216a31256ec0e0d36490b4e47f6dd900ce9cd92fb1fcd0567ab77cf16a3cad
SHA512c277201fcc43de2a7a3fe443a154b43e78302efd6174067ac10a6b9ea80fa693e92c46d5a8c2de95bf59b7eb0d4f4432fa518400da53adb6666c3cb6a59a0cdb
-
Filesize
5KB
MD524f32eddacbf24fe58c1670d879819bf
SHA1ea7bb6c3181806f7f0a830e5518f1ba9fd38bf74
SHA256090caaeed69ce983b3d45264e045e601f22bf2ae2cda1f6aaa16caaf2d24cd14
SHA512ba0e85f2ea7ea9b1c38061f7afe92e23e2c7f366e122d99fe41d3ad2d8a29db98a0bb2c94cf3a049f8b1fb3b9be45e0757e74418be486612c3701a588517417e
-
Filesize
7KB
MD57377b1230c6b687dbddcd8e99bf95d60
SHA10c8f410035fb30ce053aef389fc38fbbc1c6ffa5
SHA256ac373c050a7f398aa212df58322475209f0f083e8b4e009f192ada09b99e4e4e
SHA51244d79770497e754beb55444b831ef75ffd6f01fa2f4555a53e2e46fd1d39fb3e5e5966d7bbeb855f678de24ecc4fa97dd341e6ae5f4f60fd0d9298cc7aa981b6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5318d6b9c8ec8e8110f973989d4d01521
SHA10f985eebc9ce5dde10e36307eb0ac52e5ac71596
SHA256e430c83555fea2c82c458c0095070c4e9992c407fcdf2171201d4e003e775d3f
SHA512efa17d497a8d2a1bac788b0ab79bea172bd2d10803fca5d5339955181504094574c3e7a0e760196d9b52f9257754963056fbd8065fcd6e2b6e94d7533c0b6c5e