Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 06:55
Static task
static1
Behavioral task
behavioral1
Sample
c02fe31e4546f7610641ce77a96ba3ee_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c02fe31e4546f7610641ce77a96ba3ee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c02fe31e4546f7610641ce77a96ba3ee_JaffaCakes118.html
-
Size
76KB
-
MD5
c02fe31e4546f7610641ce77a96ba3ee
-
SHA1
69eb9db088e4d11aaecf50990478b7969fe810ff
-
SHA256
262d7bbc6753cdf310a0fdce5c1eb9917ec1e66dc39afc7e8a7476f22f84935a
-
SHA512
18964015dc4287cb135c2ab1ed7f457e6d216b729f60998224006f3e9a7c8e57d32deba58b2d76446d9f034bac33bbb34c3c39d2b0b268e4e745b1910c86928e
-
SSDEEP
768:XgOriWNcaSoagG/XQDJRAh7YVC9IWONec/LjGa/2ZyGJ9b6VfXVURAtNdBcpS29S:4/5XQDJRAF9IWONeCuZyg9GURArdBcpW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4764 msedge.exe 4764 msedge.exe 4608 identity_helper.exe 4608 identity_helper.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 5084 4764 msedge.exe 84 PID 4764 wrote to memory of 5084 4764 msedge.exe 84 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4688 4764 msedge.exe 86 PID 4764 wrote to memory of 4704 4764 msedge.exe 87 PID 4764 wrote to memory of 4704 4764 msedge.exe 87 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88 PID 4764 wrote to memory of 4164 4764 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c02fe31e4546f7610641ce77a96ba3ee_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffade5446f8,0x7ffade544708,0x7ffade5447182⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6148 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6604 /prefetch:82⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6604 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4564078217469601218,15938866153053964638,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD53600e51a0ce45c5210f02b726ea1462d
SHA105b1059290ebe397c089271109d71691e2b53a7b
SHA2562654b05ed6c9acf91ba86489504889f79a2bd376479128b7ddeec788d4958d6a
SHA512041d69a9bd9813d899980baa1796bd1729b7beaf47cc6a042f4e73f973277e735396e553f0a1c076e29e25f003749aad7231f3ac2a4dd82ac1f8a602f9b30d96
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5da1f5f2ab3d1c9a77377da098c28e825
SHA1449e199a991acd7d87a310c4da3dc1e7393fcc9e
SHA2568110b8cf0b618fa31229b981f59c138118f600c624bdb4377060f093754aa6a8
SHA512b505227a40f3d132b173f3cbdacdbcbecf8a0d216ef6a37ced0cde73d83fe5d49695d4cd762221b6826e02e1594c543fbd5f0a154bc6ddadbe265979a5acc486
-
Filesize
1KB
MD5e01ca439e40d02246e24672e5291ae56
SHA16d1ea7ba571e7cb5623be8de45f0a96d143215b9
SHA2563ec3db4e8c5e2fc160175ec91a1d6dcaf2a1957c5b5fc6ac33d15bbb421a6987
SHA5129b3c4c1c2cc21fd0d2b2eae30fb2497542e0f4d2b10b5d61846e0577431cb107219e121ee25472c9149edfd9008a74969e1561c4c96202d6ed9dd4b21c2c1472
-
Filesize
5KB
MD5c4dca89d364d2e724166aeadd6164b91
SHA1d6a6af9c2285c73bfa95f645ddd78d90f62469a0
SHA25626beb698c7bc92cb1f1e2b97a516b25aab387450322646f9f6d3a3b5020e73ee
SHA512f3aaac433bbb49980db23a2d9be3af587086db4ab02f4dfb8826ed0a1cd0c3c1b5bf0fc4a465761aabe725d4dc924eca1ce054bf5332221836bb562be55165b4
-
Filesize
6KB
MD50e69550dc0d3903e62dc192e26346e71
SHA10a68fc12c0c4f7e6456a3cc19cbfb2004983ba7c
SHA2567285236182df5ba13da20c42c69d20174e6e0f2afbfce94a7eb8de55fef86ae7
SHA512c95be440f955c92e224ce2506557d0456f3e8aa419d7e2c96b5877e457e4d58c2e58acada5cf7bb436acde0b0b986ee9f8e8b08ca14eb7f0d757f2c23663fef2
-
Filesize
7KB
MD58a6e9bfa56687fc2e94363c093342127
SHA19cbfef578fcf7a0b2d4e94183741021a0338dfc6
SHA256ee2efe926415ecc3ddac332bf388ebc9a399737003769ffd8fddc25447687f22
SHA51276d2dad9dd938ecaa67e177df10ca5f0a11eac522dedbed35f8217a58bfc5bfd3826589bece061d447bbbf418dc027e165e8d6a487a1b7b8bba38fa0b7af8b04
-
Filesize
7KB
MD5cce1e4a64d17e7378055fbf896cbfd77
SHA1240e757f8773facbd29b6d388a0e957f87c78982
SHA2568c9b34aed2f4c4435eb54e86022647dc3ce9c7bfb861bc9bfc11e2a022147f74
SHA51211503dbf74b7bf0cc1b405e4a836d5d6c654732c214ae8dd4b26cbff12172eead699379bf01909c5e51e949d92f7309808d27676ff09c4d86c74642330a77a6a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53782517badbb9e7498bcb8f20a896ba2
SHA12354a280d64ec15230583682f46b1bfffb4378da
SHA25633f7259582ee9fd1f2216e49ffa0be1e3ffeec3f7feea610c4a34a61ab56f2db
SHA512b6edf195e4f24063d443759fab33582fd58a92859b5bcb9f9858b298f085621d67621c3757d1fda7eeb1a8720dce90fa89d8dbd378a86abb7ff3f802c52f1673