Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
fead903ec5e6fb61ce9cd639f729969a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fead903ec5e6fb61ce9cd639f729969a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fead903ec5e6fb61ce9cd639f729969a_JaffaCakes118.html
-
Size
175KB
-
MD5
fead903ec5e6fb61ce9cd639f729969a
-
SHA1
ae2eeb1c1041f0d80f76b1594960b7620f7df8a2
-
SHA256
9c5b8be0a02f360dd62900b0bbb8cc5ed5231b0cc27119aa7c7776064c5df380
-
SHA512
da4c6c7b45f5312d8f810adbb76689f9567110e12f54b47d382c2daf12aacfbe149a84b99e6d9dafb757c9fa6fb1604a7dc817ec84a0b0a19427f88ce197418e
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3qGNkFDYfBCJisI+aeTH+WK/Lf1/hmnVSV:S4oT3q/FaBCJi2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 3896 msedge.exe 3896 msedge.exe 3656 identity_helper.exe 3656 identity_helper.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3896 wrote to memory of 4712 3896 msedge.exe 82 PID 3896 wrote to memory of 4712 3896 msedge.exe 82 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 1876 3896 msedge.exe 83 PID 3896 wrote to memory of 2936 3896 msedge.exe 84 PID 3896 wrote to memory of 2936 3896 msedge.exe 84 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85 PID 3896 wrote to memory of 2476 3896 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fead903ec5e6fb61ce9cd639f729969a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc196c46f8,0x7ffc196c4708,0x7ffc196c47182⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,17269895391940038851,3144294332867278653,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
243B
MD536e6c3df96bce2c0b7cc4e83909effa2
SHA16c90a8af65d0c6aeab58877ff94aef3d3b6ef81d
SHA256649b3ea6e236ab7a94a04e9f6b7c7bfc50d0410b18ab17f4160a250748e6a848
SHA512d44b837b0629390a91f56b594cabaf04bf7bd8e86c1e0ac3a7899d3c05938efdd87f4fe7df0b5b025e4d933b9a71d5c254b1b8b27b6de3333dc86c3756f1d5c2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5a32a001be79d35582617077b4cf1f1cf
SHA146a2ccacbd1c0bd8c03882c95ab9efa821ee4742
SHA256fa8186edd2202d738d4d0b7e92e06e7533de900b6e8ec7709e42ff10d75fbb60
SHA5122e3df88937d27e7ba5b54cb90aec7eae34a9180f28e64155e3d6b88ae15fcaefe0702737f98bdc738d693b0a5784571b2d742e69ff604e4e4228a69b82142f59
-
Filesize
2KB
MD54d827ffcd34982203ff46d83c349a464
SHA18ffcac99b2ba7a435d49d435506719dd53e90b33
SHA256f6090fd5d7f6f14dce33d0e9fcd4c53131d9c8ad3b0b195144142a4a7861d710
SHA512833321bf60e90671b54a824b3f9956c91321d8b9050fc4275ea25eb95ed80db4dbf24fabf9929df19be9d3c575e996c4c4cfcad986f694c9a56dc3ec7aa116e0
-
Filesize
2KB
MD5d6e8936650091bdf0b2fb1204a74d3d1
SHA1ad7e298a9245065d2de68132de943466b6ddf77e
SHA2567fca2d3e291d0df90c1b31d5415cd6378dce4fa8efe4b45b5c8f8e77f7576c52
SHA512313a47619545121bfa63627bafaa807a29b1d425a413158a0521695d5442f835ecd5dd53ef0ca5dec9737147818fb2c054962c6dc9b69370e418f5fb35ed0d61
-
Filesize
5KB
MD56574c2eb190cc26f2341544ebc2dffa2
SHA1febee1753afc7aeee565e92867e15a219a691b6f
SHA25615fe784ab08568760a29f8af01871ecbfc35f181421cc2fecd7d820fab61d462
SHA51237af354b128f405624432c7d8f35bffca754c9e041613d4cad86b447f26369d2b91b4281465bb9e60aecbac5c17f3db8943a7e16b201f0972e2d93d44b2301ef
-
Filesize
7KB
MD5e787d79d79e791ab3c45df7641320ea0
SHA145ea3c293557d20c4b1c05f0e5a6e37a0d09036d
SHA2566ef971e3ad81273f40efed2386f34a6a6e99eabb1f725ad1623b12715caa4490
SHA51233100212575f946fd19f254a0522e04640a8d723ed8b779e152f848f79139d1bffc8fc945b89d8bb1dd8d893d8946e285f851b03d265e579892417912903ca89
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD596104a8e34649a147199b0b4f141641e
SHA1af26349b78fc1889b844482b4ea1fc763d5f8f54
SHA256f95c583d7f57bc0c049236e7f269d6e9087716350530f1ad19bfd46ac435c371
SHA512bbd132509f2aa15b7e441ada4cc6aed4260a69696e0c8136216819f5801f58e4558e3afe6e254a1b6c3ce7372f53e2ba66175073ec9880d0410247598390ba49