Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
db43ffc5c25e2fadc8e8add19cb6193f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db43ffc5c25e2fadc8e8add19cb6193f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db43ffc5c25e2fadc8e8add19cb6193f_JaffaCakes118.html
-
Size
175KB
-
MD5
db43ffc5c25e2fadc8e8add19cb6193f
-
SHA1
16c949029faf445581d8f36d8bc5ee333d13de7c
-
SHA256
5343476bc99923cdb1924a3434c1cb3659d84c074b1c148658244a0fcc7cb329
-
SHA512
ce2868569d356e06f0b50123b04e52df1e486c8c5e55d113d69c6173c2f234a7059f1bb62138663cddefcd75b66c8360d7dd41d8d55ae218a1102c6aa4451fa1
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3pGNkFJYfBCJiZL+aeTH+WK/Lf1/hpnVSV:S9CT3p/FsBCJiKB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3108 msedge.exe 3108 msedge.exe 4696 msedge.exe 4696 msedge.exe 4756 identity_helper.exe 4756 identity_helper.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 2180 4696 msedge.exe 83 PID 4696 wrote to memory of 2180 4696 msedge.exe 83 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 956 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 85 PID 4696 wrote to memory of 3108 4696 msedge.exe 85 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86 PID 4696 wrote to memory of 2820 4696 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\db43ffc5c25e2fadc8e8add19cb6193f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b8ed46f8,0x7ff9b8ed4708,0x7ff9b8ed47182⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4432 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4280 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1397734047066216002,9787674739581579331,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4292
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD59a71fca07372e468dd0ecfb2b5c60005
SHA1a8b3a65365bd38ef2b00b8f010886af4d9a96c3d
SHA2568760e847bf448c1456494f4b2858be9bf3d947c09f8591f8727d0392332babd5
SHA512b831a80b68a46db38a3fdb3de94a67bc798c7979a02f6d8ffe2f9bba798a7c27f174d30a4898e5215f4f82a44933973829400bc0db21b615ef8a00a3a9e0e529
-
Filesize
2KB
MD5c417a6641452e12d7e07e1befb547786
SHA11afc4e648bb636665c4b7646298fda185347a351
SHA256c864a9a380b56dc0bd48de253455e5b73a5b51fa6667fb6adc3444b9987df3b8
SHA5121c9151f5f15761a2b9a41f0f6676af8a62cff2c1253052ae4507918b36551260b33e7bd95e6b3f8caf24b796c29acfc00a7460aee5d6c7d1da0a079cd5717602
-
Filesize
2KB
MD5e76a578a42b0cf97e0acebd1bdd6352d
SHA10690598f4e87fd809f81d8afc0f3b8826b746c54
SHA2568db58d700c6083ccfce5369afd980f05aa302f6d15de0304a9f557b61bbbafa9
SHA512aa55a739390d8fcc727c210990e9ce525b2202e8af9b67f942f79402f459abb684f143be58d50d5d9b04b97fe88fb0b495b214b9de0625361ace1aceeb1aa017
-
Filesize
7KB
MD5ac30a5b4e4d4d7bcf50fbc9a5d41e900
SHA1a5b616fcbbf01125afa17a3d740e3444320a1d59
SHA256640dc0d059f44f0a89aff0ff81d7fc2b3868f54fb3bb2034129d34ce45654da1
SHA5122dad2d0b3ebd0c0d843a9d1bf0d8d53794ad040770c27e0495186174ea8065e9db209508a91cb7451c3a06bb604973e03bbfe39de1a94ac7b3851b7e6f91b314
-
Filesize
7KB
MD55a517db8a2cafda50d84a8050a30ea84
SHA1cd80513cebbaa7717df33a6307deec0ce40a4276
SHA2563fc3fc32ffaf362cd572f63cfc758ba2e0079e402337ff0c71360d0c2895e0ec
SHA512fe2485f61b26f3aab311504e78f666aa42fe0f8c1311cfaa67ee9c6fbed509438c8ba3b5490557cbb8073702140d983e73ebc7e7f6f6c42591b57a2a754140f0
-
Filesize
5KB
MD5963249cd84345ce3fcacaef061df7fa5
SHA1bb54736abe10eef952db971ca4c80bc1cf460952
SHA256cee2ba4a5e3bb52603f3912b3c200127d170ea79d800e86d40629a2fcf16ca38
SHA51266271a38108109829c486d2a77d145f4e132f2c3a3425ba2ca724c4667eaf8dc1d65686706584d47d53c45bb73f57cf313fa40c01053067afa9c90ac2c7fa6d8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5f5d63b46ade066f0f3c16afc62d69894
SHA1feb8f0e6f66faf6024f8e3586eb14168080dc43a
SHA25604db5281bbfa734db12081ec12911de98dcc0e1c912e65cadc8fd852d752b6c9
SHA512d253f2b21b53493bfa39ceac2e13f890b174e9360d227bbe563407e8319052ceb8a51e10571b81a5b9fefd60d5897428050c16ff9e4267d3b8a11de0d755eb0d