Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 09:27
Static task
static1
Behavioral task
behavioral1
Sample
a2033171730495daf44e8e958105e75c_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a2033171730495daf44e8e958105e75c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a2033171730495daf44e8e958105e75c_JaffaCakes118.dll
-
Size
732KB
-
MD5
a2033171730495daf44e8e958105e75c
-
SHA1
cb7fd8025d5721616760e6b8405c3cbffb023c62
-
SHA256
42e9b0aef3f1f745e710b8971d4e3a36c0886a6f21dfafc125c259e69864dc95
-
SHA512
1f1024904048bfc88e14954af289d30b0adf40e41980718160a672df1ee7ec4a18519ada34c29fda7a2f12be74f5e3f8c7f528d71d3542c69fe7a92dbf248131
-
SSDEEP
12288:zBH5H5l0wzJFkQVW3mLOb87racOZVq6O1:zfHJzI3SrsXC
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 448 3328 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2528 identity_helper.exe 2528 identity_helper.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 880 wrote to memory of 3328 880 rundll32.exe 83 PID 880 wrote to memory of 3328 880 rundll32.exe 83 PID 880 wrote to memory of 3328 880 rundll32.exe 83 PID 3328 wrote to memory of 3684 3328 rundll32.exe 88 PID 3328 wrote to memory of 3684 3328 rundll32.exe 88 PID 3328 wrote to memory of 3684 3328 rundll32.exe 88 PID 3328 wrote to memory of 2004 3328 rundll32.exe 91 PID 3328 wrote to memory of 2004 3328 rundll32.exe 91 PID 3328 wrote to memory of 2004 3328 rundll32.exe 91 PID 2004 wrote to memory of 2224 2004 cmd.exe 93 PID 2004 wrote to memory of 2224 2004 cmd.exe 93 PID 2224 wrote to memory of 5080 2224 msedge.exe 95 PID 2224 wrote to memory of 5080 2224 msedge.exe 95 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 2228 2224 msedge.exe 96 PID 2224 wrote to memory of 4532 2224 msedge.exe 97 PID 2224 wrote to memory of 4532 2224 msedge.exe 97 PID 2224 wrote to memory of 1860 2224 msedge.exe 98 PID 2224 wrote to memory of 1860 2224 msedge.exe 98 PID 2224 wrote to memory of 1860 2224 msedge.exe 98 PID 2224 wrote to memory of 1860 2224 msedge.exe 98 PID 2224 wrote to memory of 1860 2224 msedge.exe 98 PID 2224 wrote to memory of 1860 2224 msedge.exe 98 PID 2224 wrote to memory of 1860 2224 msedge.exe 98 PID 2224 wrote to memory of 1860 2224 msedge.exe 98 PID 2224 wrote to memory of 1860 2224 msedge.exe 98
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2033171730495daf44e8e958105e75c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2033171730495daf44e8e958105e75c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c3⤵
- System Location Discovery: System Language Discovery
PID:3684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start http://zorgee.ru3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://zorgee.ru/4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xfc,0x128,0x7ffbc70b46f8,0x7ffbc70b4708,0x7ffbc70b47185⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,8909837264327974687,12030503367415660810,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:25⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,8909837264327974687,12030503367415660810,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,8909837264327974687,12030503367415660810,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:85⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,8909837264327974687,12030503367415660810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:15⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,8909837264327974687,12030503367415660810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:15⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,8909837264327974687,12030503367415660810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4456 /prefetch:15⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,8909837264327974687,12030503367415660810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:15⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,8909837264327974687,12030503367415660810,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:85⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,8909837264327974687,12030503367415660810,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,8909837264327974687,12030503367415660810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:15⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,8909837264327974687,12030503367415660810,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:15⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,8909837264327974687,12030503367415660810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:15⤵PID:5468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,8909837264327974687,12030503367415660810,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:15⤵PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,8909837264327974687,12030503367415660810,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4144 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 8603⤵
- Program crash
PID:448
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3328 -ip 33281⤵PID:1552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD54265df78318aee77d8fc5dc21cef8ec1
SHA186a6cb437ec9b907d6f34c70411e31ae4e72bd58
SHA2562502a6cd8dfa0d2c252045ed96950fc4f9385ba6cfed94dcb6b34dd2812e053e
SHA5121bd455c95c7e5f1790e398309904d6d890c59d9d8bc05c7e394601a8664aacd3051c6dd0e08a4921d3c9f0e7714d13f666f88e045baa952ab1f1d82c89ef61af
-
Filesize
1KB
MD55e33136494ad145bf62f9613da197844
SHA1ab3289f9632024190aa5e951026e1bbab55cb9d3
SHA25613f7fa43c195d5f3051bb88afc5c7b1993a55c182a2284d73c675c0481bf6e2c
SHA51278113a451e7884929fc9d6ae7ed80a9276076e51fe6ee885dbfba5b5686255277f7544c00ef7edf9751dc13170320e5257a73e45ca5d68dc49665efdcc28f863
-
Filesize
5KB
MD5a9b3b834082f7b69d93f9667c7a278db
SHA1a12d6bef460f1f57a023581cfb4ad3cc0e26fff2
SHA256d4fa0235224fa7951fbd8e750c02ba33ec79cec887750cfd9e2b3a0473ea86dd
SHA512b47fda2dc28f3671c277764618aebc3f52fb2bee70dadd3157d261e8e948e3ea2a3d8151aed53bf0fbf76280a743256e16c16067b78e43b858964840b4f62e5f
-
Filesize
6KB
MD59c77f9a83f1043cddb547819b39f2b9f
SHA193404cba69c74e58191091a7831096965ad6c6aa
SHA256130798b73c52a4c6ee4fbdde17466aeed0aad3adbbdb69d41edf5a93170872c8
SHA51215ecfb3c4afd85a9f71609eddb7d8e387da2dd88ab83f4681d31b8113cf3e038c0df931b5af59451be7e76dd8c3e13522a9ef3de0b2317db5017b07d1d793fbb
-
Filesize
6KB
MD5430a796663e37fada240eb3a17b39946
SHA13aa4a8e7ced04ee0f7735b53fcefe2dba40d8e45
SHA256bbb9ea54b71ebb541e69a4f3971e7d7494a884d8b24b13fd8b7927780166bd11
SHA512b37a31bca526722286ae86c6c8a5992e0d29ca80d8133c7220f8dfda4b3bcab21fe3dbf02d29a253f984cdb2b5424b48bffe15b73315035e6141663c48a3b38e
-
Filesize
6KB
MD5b7078f00a7e384c58f9d8734833e4848
SHA1bbee2a31136cddf561940cfbdbc57750b384cb8a
SHA2561d586b864382f6f5ae8138328f8bf638a73b26a0d0a0279479e45c0c3ad96dd8
SHA512ee6c3f2273d8b207a3a1583c8b8cbdd74c139b59eeab828a1c6aa91d7ff6300e40d2214f1a62048a05415c5273a09e8c271e506ff17c4f03efc5c34af9b73a3e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59f620733f301e356d8192c8b6e2d1541
SHA15be36361e54dc0d2874034d5d3b4286ca8ff9334
SHA25681d8dface47d669f9f36b8de4c23a35489418eb9fe1fea0a867970882262571b
SHA512c8d3edd65f45fccf49c6468543020df30220e59036d7d89f2bd5a724f944b7e55169cd0fb5395714fd009cd43f187946a2b7b8b0cd0bfed11819d2bd632abf03