Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:23
Static task
static1
Behavioral task
behavioral1
Sample
eaaa2b25a9c899ee4f5a3de1cfe645c2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaaa2b25a9c899ee4f5a3de1cfe645c2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaaa2b25a9c899ee4f5a3de1cfe645c2_JaffaCakes118.html
-
Size
175KB
-
MD5
eaaa2b25a9c899ee4f5a3de1cfe645c2
-
SHA1
3cb93bd6a2f89b2a577d5cd8c4152d2e4a4a000f
-
SHA256
b15ab05b9f9e0b27f287fb527c4479c1257a6c7e59334c43ac8f919e834191a9
-
SHA512
25df18176c0544f191849a13aa842143079b12a48d19978dc32fbe164ff74cab7516807fb264731961895af197a4e43f2ba00fa63e29301c8ff941ef02aac743
-
SSDEEP
1536:SqtY8gd8Wu8pI8Cd8hd8dQgbH//WoS3GGNkFNYfBCJiZ6+aeTH+WK/Lf1/hpnVSV:SqCT3G/FIBCJitB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 552 msedge.exe 552 msedge.exe 4904 msedge.exe 4904 msedge.exe 432 identity_helper.exe 432 identity_helper.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4904 wrote to memory of 3168 4904 msedge.exe 81 PID 4904 wrote to memory of 3168 4904 msedge.exe 81 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 5068 4904 msedge.exe 82 PID 4904 wrote to memory of 552 4904 msedge.exe 83 PID 4904 wrote to memory of 552 4904 msedge.exe 83 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84 PID 4904 wrote to memory of 1412 4904 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaaa2b25a9c899ee4f5a3de1cfe645c2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab96846f8,0x7ffab9684708,0x7ffab96847182⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,109083664496296748,15228523027398874279,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD518d4c6bacbfa041eb713e51a5cb74499
SHA119732c2e4f575ca7ffd172ef80c0a6c58beb44c8
SHA256ef87036c5ef8da0dc2fb9e20ca03de5827259b6b7bdd2f3b57a4b8e354a8fa41
SHA5123b7c6bf1c8668484c61c17e0c819b90f77da6a51178b242d5e99d3dfbd42a719d3bc2ab9ba12afaa3b010fbf1f7ff144c2e5bcb22f96417588805be280a6161c
-
Filesize
2KB
MD56281cbe760bf866df1f1812ec404d10a
SHA1b03b328fe7987c7fd7a58f58058bcffa2904f767
SHA256177b40cd29522d9c471e89cb38b37b5634d279399cd1a9a6c256ae66fb7b1bdf
SHA5126ffc5dafd258b182efa2358b242683561dc637512f3c15211cfa64d7c248d136e7db6af490621b86ca766bc908da97c508f144d14f6166bf5ebc4682c4cdaaf0
-
Filesize
2KB
MD5cbcf681e42b9d8bd7e166ded2642758e
SHA1eacc75e0061acd546cfe120e81585c4da8e26689
SHA256e2296d8b690839e6a7e2714b8153158110ccf5d6d70a4980741dd401172596ca
SHA512a607b720d8b1d01bccc9ba09065b56c17a106050759c4ddf4250766e6fefff9fafd06e4c6f47e304bbfc8ab50bd7366fe85ccc48ab426bf7132553fb6a2499c6
-
Filesize
7KB
MD5e16658b931416b795cf44435446278c4
SHA138a0bee981f118e234a9a9b504bd3b23864fcd8b
SHA25699de3e6adc1f19c2c0ccea2e8b53aad9b3bc8074aeb5a84e4a635df35706e399
SHA512bbb7dfb44bdeb19441fd0a92ce5485fb5441fc9dcfca926525d2f6ec425cfef726826926c009ee610be474306833642ee89b86fbf0f336a41c88aa75d64d12f2
-
Filesize
5KB
MD5b60f1cf79679bd51222fc818cd2a122b
SHA1f2d3678f3a0dce42fe5907f1921419be49f6f5cb
SHA256e39ed00bc6b689b81b77d8f5acd28ce30c6062fbd409e64cf1ac02abaa8044ca
SHA5126be8cf02b2cbbccef0c5d92d7363fc573551b7fb6ecc4a7e291c87f7e828372a801e133954496e8d9f2ecc4f99cf1ade3fd565ece9f6d7ba217f9e9bc30a23ea
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD502e44f9b54b73367b6ff4763e4ea1e10
SHA18d506d0d978fd00577a074964c22dfc7f494e183
SHA2569978b8abbd5642ed69f054ebbf1873863851906f7c7e1b130ed97f814da52d41
SHA5120d100c9dba49ad4bf35d34648dc091d2e966c4a4b123bdee78851c5eecc54c7b22c0bc8879e6a5ca494625b3bb96b64a3b857c797926843b4cef9f2ac055fa67