Overview
overview
10Static
static
3ea746109d6...18.exe
windows7-x64
10ea746109d6...18.exe
windows10-2004-x64
7$1/$OUTDIR...er.exe
windows7-x64
7$1/$OUTDIR...er.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
32611067143.html
windows7-x64
32611067143.html
windows10-2004-x64
3contact-do...g.html
windows7-x64
3contact-do...g.html
windows10-2004-x64
3home.js
windows7-x64
3home.js
windows10-2004-x64
3home1099482986.html
windows7-x64
3home1099482986.html
windows10-2004-x64
3home1259317828.html
windows7-x64
3home1259317828.html
windows10-2004-x64
3index1449123078.html
windows7-x64
3index1449123078.html
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 02:53
Static task
static1
Behavioral task
behavioral1
Sample
ea746109d644f4060bcb66144b4b2e34_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea746109d644f4060bcb66144b4b2e34_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$1/$OUTDIR/sftp_plugin/tc_sftp_uninstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$1/$OUTDIR/sftp_plugin/tc_sftp_uninstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
2611067143.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
2611067143.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
contact-domains-org.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
contact-domains-org.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
home.js
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
home.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
home1099482986.html
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
home1099482986.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
home1259317828.html
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
home1259317828.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
index1449123078.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
index1449123078.html
Resource
win10v2004-20240802-en
General
-
Target
home1259317828.html
-
Size
17KB
-
MD5
9e40a22a452816fd7d81aa9254e9fd40
-
SHA1
0c419830cf8cd6d9e7b5f4f2c64c1a87567e730b
-
SHA256
5dc34d66248d7054b364fae9ed97f5ec3da0fbf9a3fbabcff3cc286ea7c4f375
-
SHA512
4b984b8d95a79751e3b4d093200cca68d82ca82df8f0b1653b2db5dda795a8da6dc1d0c9fd8362071de222fac44f21d72499293c7676b572d440046f033036ce
-
SSDEEP
384:Ws/1ey5mfePOyPKTX2FwYy87zGCCkdW/a4VzlZaCPtnclXFlVW3sq7Bm:dtejePOyPKTX2aD44VzqVwsq7Q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2244 msedge.exe 2244 msedge.exe 4124 msedge.exe 4124 msedge.exe 4152 identity_helper.exe 4152 identity_helper.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 2436 4124 msedge.exe 83 PID 4124 wrote to memory of 2436 4124 msedge.exe 83 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2748 4124 msedge.exe 84 PID 4124 wrote to memory of 2244 4124 msedge.exe 85 PID 4124 wrote to memory of 2244 4124 msedge.exe 85 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86 PID 4124 wrote to memory of 2924 4124 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\home1259317828.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae52946f8,0x7ffae5294708,0x7ffae52947182⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,2795776518804649505,10498310009325530911,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,2795776518804649505,10498310009325530911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,2795776518804649505,10498310009325530911,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2795776518804649505,10498310009325530911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2795776518804649505,10498310009325530911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2795776518804649505,10498310009325530911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,2795776518804649505,10498310009325530911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,2795776518804649505,10498310009325530911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2795776518804649505,10498310009325530911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2795776518804649505,10498310009325530911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2795776518804649505,10498310009325530911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2795776518804649505,10498310009325530911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,2795776518804649505,10498310009325530911,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD595ffd629f4500f99224c4b088ed8daae
SHA15b44313afe6dd90e8ecb3cad011a60a001d1b9db
SHA2569838b6eeb40f18f63786b130c7e2a0ab7410ebe5c4ee06b47882aabf14dfa650
SHA512ec54019f962f9a7fbcf034d7ed701108cac77bb5a82afaa5dc96329a9cb1d4d2b3bde72c68567a566244c790c1beec16a86244b91b4624577878b8794f86665e
-
Filesize
411B
MD5bcbc96dfb9da7db39528afa21c1c35eb
SHA12e0821ad6883e8fb13afd441315c582f4e6a6522
SHA256f912bdde3d2f5f02513730a690a774dcb89c45215c72f73f393022d6588a7735
SHA5126457f7e23cfed821eda8eb3aee29083a7fffce2375bb3fc162f110be543f8545e3d5108f00b69fa253f1eb1359d3efc4deb71f512822769ea75c9f88c7062239
-
Filesize
5KB
MD5df5b80b5b90e7848e087a1fb343afe1c
SHA13a0a7ec8061573041f59ae7f8e08f6a202b0f200
SHA256383c661e85259c70692acd7ff6ac145ce934880812d2f79fb41645ffca2c543c
SHA51212a70f0369df4bec5fd0c613713b09c6bb8a355ab84fcfedf34cbedb60a361dddf7315df6f4c0a475cb865f09f05d1d646a4ab1426f94574991ffdbcc8f7e9e9
-
Filesize
6KB
MD5a99daa4eb4a7cc64409338ceaed7add0
SHA1813658fa1a2d5da5caf8856a19dc7690166b8def
SHA256f5613974c506b8b572817a0f4ebcd39e508d6b3ee0efaa4d0230801e2f19da45
SHA512723d21c2989d87e2f35d8101bc2c92bd528873f749290b5bd6028132ce0ddfcd50d06ea3ad379cab94da8e20817561dbd5dd2ceaeef3b4cc45762bde7062288a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5523473722ef72b28f3fd573badc5afd0
SHA1513ee4e84cf2d0b7ef7548da981f643364e993a1
SHA25652521c54f59710118537c983595c04b7620ae437fdc6385bdd076e718b2f2fd7
SHA5124d8df3e38f4300335c5f11c8fb4f8164d6e9656f807aa6a7604e49ddfa97c981348b7aafeb29bb1d4714b5806f7f6c61304df474b9cb7d59c0477ed50f6fdda4