Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
fce142d3c809e388f60bc393a5755bf8_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fce142d3c809e388f60bc393a5755bf8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fce142d3c809e388f60bc393a5755bf8_JaffaCakes118.html
-
Size
175KB
-
MD5
fce142d3c809e388f60bc393a5755bf8
-
SHA1
56a3f6b01bbbe6313342e84c2867e718bac80103
-
SHA256
c99558fb16b0f5c4b719b151c36626fc6b191f7691337b2f5c9c31ea7473f2f5
-
SHA512
f5f1354ac5604d8f628d674e8c1b7c10e050ffd513a0ac84619dff217f104ba4ca4f3855d6fcb6a0ea3a2703cb1138782835fd60f838361c28a2bc86c0b14ce4
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3pGNkFaYfBCJiZw+aeTH+WK/Lf1/hpnVSV:S9CT3p/FbBCJizB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2084 msedge.exe 2084 msedge.exe 1572 msedge.exe 1572 msedge.exe 4252 identity_helper.exe 4252 identity_helper.exe 824 msedge.exe 824 msedge.exe 824 msedge.exe 824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1572 wrote to memory of 4952 1572 msedge.exe 82 PID 1572 wrote to memory of 4952 1572 msedge.exe 82 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 3872 1572 msedge.exe 83 PID 1572 wrote to memory of 2084 1572 msedge.exe 84 PID 1572 wrote to memory of 2084 1572 msedge.exe 84 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85 PID 1572 wrote to memory of 4200 1572 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fce142d3c809e388f60bc393a5755bf8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbda5446f8,0x7ffbda544708,0x7ffbda5447182⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,10301593423848802589,17101185913894990851,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d4829218222c8bedb9ffe89dffd37095
SHA1aae577f33f413ec3d09f2e7ff5d9cc20a602241c
SHA25649239b229a2519583ba5d6de3702480b8a8ebf3cfaa8945100dbab25fcb02b7b
SHA51203e26a2e3de41b8a829b5543da504c7d7ccdc4c112d629efcac24dcda23acb50a52b5b99572b5efb2a01cf392a457cf9fac85663b3d63f7606be00dba218f8f1
-
Filesize
152B
MD515e9c4b4eefb3e1c08a010e748e10f58
SHA13172378f2c7a00553ce086dbf53fcf3126c5a724
SHA25607b56a769467e8b57f9b7acd9d32da266ca5000803758c18bb6818ac236c7000
SHA512811058b539e914a812c88543bb6657de736f691d18d6dadb5e1f6ced286780fb334dc5f575babbcf4fd2dceda30d1bf4004b374c5775e7f278346b100b29eb7e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD51742dfa74c067ad46883d6ecf5692529
SHA174d7a358dbef1b53269f2e0a02a6c89e8f3ccc38
SHA256ac729702e0a06eb32668cbb45b7ac9736e2b7e47309b1e3dfb898a7b264d19f1
SHA51251d0599a464f379b4498d451cebbd7c8ea942abbc18e885de0140dc022dac1ee7f6f10889618478eb3439bdc514d9b999892df999734845f0d2b53c176eebcb0
-
Filesize
2KB
MD565ef09903c2a5ddec75d91abd6315715
SHA1d74684f27faff291395f5a8aea928d5a9159003c
SHA2569b15267179677894e7be88a35dcc464c064bd15d70b4e09cc03e5903ca4fdbe1
SHA512b1c9fea2b2284776fe977064ef5d1eee464ac5d1d59b4dd30bfffb0fd32061aa795f14f9d5c89a96e823b591024a49ddfdf076b41a74b6ac25f6282066d0fd5a
-
Filesize
2KB
MD5cb3dbdf00e06e227a038e6a44086ef5c
SHA1dab83e8ccba9cb070aa53575ce38dd5df43aafbf
SHA256b19bbb8fc1650806ddb08db9ca512d88d1d1c42decdc0b7860e6ebc5e43cb48a
SHA51255b18d099767c1344aa169d387b52a3abd369f9c491b80380ed626f247b1dbbf7d1dbe73bb8fc435ccf9b3f5c34a6a205cc747958a66f8cebfa033a7118c627a
-
Filesize
5KB
MD532af0fc257036bfac454499523ecb9ba
SHA11ee5d937668e8d7c0a26b64bd81c85e61d246e86
SHA256dd298a9f06778ec5ab5b40a4850a401f5eb63cb39e2d5dab37a69affcc814bdc
SHA51261ade93e3b09413038c60504c72939e4efa59d78f317ceb3950355bd7ffac55fb72c236efc113ce688c5f8846430f69f06de0517c058de719219ad75ae11a5ca
-
Filesize
6KB
MD5cfc2877467dd9106b2cc4b591b5bcb94
SHA163c4ccfee6bd426c6bbecf5621cd727432e9eb69
SHA2567776f168b05edd54c58f12f9ceaf204394da03d57d2f3378ce99a8181c69bd1a
SHA512c02963d557cf07bc881c9851517c18c1a052b8657dce8fa38d149918183ce4762128f88e9520601037e60e330f3d0eedd4864354841e30a325f1c3d65729c1f1
-
Filesize
24KB
MD57915ba0545666aa5833cf9f9f86d45d6
SHA1743ecc319bc2a54973582d4a5198042a48fbe8db
SHA256f8fcc045da13bde0f5dec3ada86342105cbff34ebc2442bcf51e8ed509a95b20
SHA512a53036251a22cdc95579ea8641c5574f1dc1f7dfd0390f00ebeafbbea0c1a2c0c3e6dba23bbbb8d8e2c77a3e1e816ccfaf84a97da1c334019c8df1414999d1f9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD563975ef9861da3515a7d8b103d43006a
SHA1a573019c95a22397ca91d272853b02206e4281c6
SHA256ee0225c58953554e0fe524a43ed095417a7a5179099b3a811a318e0d8e0b4ca2
SHA5129f219984da6638c6b83c02189f4117856fcbf60f090a008a88ae2519ac1318c3e32d71bafe8e1728443d9011503916a3398772a4cdd10c28f1b80650561b15ba