Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
db3cc18b927e7bbbd1baf7a4b8674c6c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db3cc18b927e7bbbd1baf7a4b8674c6c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db3cc18b927e7bbbd1baf7a4b8674c6c_JaffaCakes118.html
-
Size
175KB
-
MD5
db3cc18b927e7bbbd1baf7a4b8674c6c
-
SHA1
0c97828a321f5f028530da8808c30a2e674ca426
-
SHA256
c762315809ad0c2c15aa637b040a6134f3486d30b5af7e6d5cf64bdebfe18c2c
-
SHA512
d5a3202d7ca0506b755a5dc086e514a33b105dd89d4bc0adf53fece9e11e65ad3d658a45f7dd72f7f228306a0dfde08daad0a657066fa2d925c162c4263c80e1
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3IGNkFSYfBCJiZV+aeTH+WK/Lf1/hpnVSV:S9CT3I/FjBCJiYB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 380 msedge.exe 380 msedge.exe 4568 msedge.exe 4568 msedge.exe 3044 identity_helper.exe 3044 identity_helper.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4568 wrote to memory of 1116 4568 msedge.exe 83 PID 4568 wrote to memory of 1116 4568 msedge.exe 83 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 1628 4568 msedge.exe 84 PID 4568 wrote to memory of 380 4568 msedge.exe 85 PID 4568 wrote to memory of 380 4568 msedge.exe 85 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86 PID 4568 wrote to memory of 1120 4568 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\db3cc18b927e7bbbd1baf7a4b8674c6c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1a4646f8,0x7ffc1a464708,0x7ffc1a4647182⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,900507660776815901,7646912834830315111,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1604
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD568c17a1553d8c0eb01f6d1081d85047c
SHA1cc80bbedcfe674cade1f2874fd6355ec306316a8
SHA2565ea2b79bed818918d64c6521b4d99956327ed79cd3e9ff66c38c47f86d584b29
SHA5126259fee9de8175a416baa256a69fb4e1f580556d340603a04b2288b656aa57d00fc32489fbc94e50dfd8acf5d8763bcef6a893ee100f95a445cf32006f3312c4
-
Filesize
2KB
MD5ba2aa251c1ea16abd36718ed347f91e7
SHA1ebb469cc7913b5846a859c7cdd4538803a93616f
SHA256d7398cf9b0c15d980cd659f1135754b7df032870e39114a3f15fa0afce70c703
SHA512b53423083f363f81927f977e13c5f73a9fd4afc0acbe13f8926b19e9a56431c33aef0c3b9355a9ee55a2ec0e1273de7d422277f35916cd1558f9f4c7070206c9
-
Filesize
2KB
MD56dbd24db94a5247c0afbdc5def368414
SHA1cd6f6b1917d671ce60e9042e0ca5e00edbbcc756
SHA25671f6ae7dc381cf10a287b30958142707c1d45a0b6e5b17bfc7d121a9bd32d5c1
SHA51255f9c5999201a617bd271bb481ea0536ffa57b3be5c71ab5093668912e2657646b4f5d99c4e7f3b1c5102776ab8d307d3b3bb1ba289bd17ee40a57e3e3ba5d4c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD55248c0370bb674d5db15df591c7ec4d4
SHA1bf5b2abf00a27541d8c18fed7f92a22d7887e198
SHA2563b4f6c41e4e089f9d11a32e13e72683be959b3087ebdaf6214d83875fabd2e91
SHA512b418006b83e025d11aa706b5d50fae62d6725711cddfdf6a1ee1b0c3a7e5dfc7d9ebb8b7a6733ace500045b645ed0e099096b98a18cd9d7c37dd3f36dabc9688
-
Filesize
7KB
MD556f7c1c76fddb99c642a9e9790f2fdf1
SHA197df61b655678eee8da9a0ec238982f560d67220
SHA2564869729dcf4c3ac87bb7e316e2fd564c29c96d480e8955388e8370a924155797
SHA512372dd2e9841081ddcb33fc70d6e1761129fd0725fc371c2343b7ee54720e877f31eb27caca6c8a6736182173db714f491d4a3eebd441f8b18ea6de956fdf7d3e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5eebf799a0f535e32e97aa4dc35e4690a
SHA1fb9ebddc29f2f957eb5561dbabcca31cc9cbc60f
SHA25677e728892b1980c0649835a0c6189b9300957967b69a6fb63cb1ee46f56dd794
SHA5126113e59993a98353c482a9d359ef637a2f6bf05f1c34fee1b74731cb718c2965046d737eb204a61fc4eac76dd245eaba6ac06db489d9fb830320a37d5e303bdf