Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 16:49
Static task
static1
Behavioral task
behavioral1
Sample
02531d99a38bacc98ec57f642a604868_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02531d99a38bacc98ec57f642a604868_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
02531d99a38bacc98ec57f642a604868_JaffaCakes118.html
-
Size
115KB
-
MD5
02531d99a38bacc98ec57f642a604868
-
SHA1
2d615d49531a4871693bba0932cb1ac14415f857
-
SHA256
5a428fcfba4a419aa1791e5932abcbcfb846a6a816ecd8a1642efc401a54d34f
-
SHA512
6bba443ac8e3d739668dbcda1e64a62b320952c1e4cfee7db72b31f285657c2595d5dbf1ebfe9053c06f3da3637e729da832557a56efb829c287d46bbaa46428
-
SSDEEP
1536:8xFejacfHsr4OlDJNYh8JxYx9XG+6umMCP1KWF7yeztszc:rOl9NY2ojXGunK1KWF7yeztszc
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 27 sites.google.com 32 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 3736 msedge.exe 3736 msedge.exe 2412 identity_helper.exe 2412 identity_helper.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 4188 3736 msedge.exe 82 PID 3736 wrote to memory of 4188 3736 msedge.exe 82 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 336 3736 msedge.exe 83 PID 3736 wrote to memory of 2944 3736 msedge.exe 84 PID 3736 wrote to memory of 2944 3736 msedge.exe 84 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85 PID 3736 wrote to memory of 3800 3736 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\02531d99a38bacc98ec57f642a604868_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2a9f46f8,0x7ffd2a9f4708,0x7ffd2a9f47182⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,11146921956146418907,17194894294517826910,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,11146921956146418907,17194894294517826910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,11146921956146418907,17194894294517826910,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11146921956146418907,17194894294517826910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11146921956146418907,17194894294517826910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11146921956146418907,17194894294517826910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,11146921956146418907,17194894294517826910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,11146921956146418907,17194894294517826910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11146921956146418907,17194894294517826910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11146921956146418907,17194894294517826910,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11146921956146418907,17194894294517826910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11146921956146418907,17194894294517826910,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,11146921956146418907,17194894294517826910,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5b192809cf6f6da71321624986fffb84d
SHA10b048d5652b640dfe7a649269224277d5231113f
SHA256e55dbc52b5839f713601a2e372b16b32788f03ea277a1765141874ea418ba7ba
SHA512651863e655301960f8efbe0fcad30be071c51ba61db58dbe60ede59e58c5718869e0def8c9fe7dbba147bf92bd73ab3dd754696d613e2ec4f8a2a4b424a42ec1
-
Filesize
2KB
MD584fc08a823d021c58a2b8a39bbee8c5c
SHA1ec52b2302a0a940e2ef7d74a83a3ed8a8307f172
SHA256a6ce1e3d399dd6c7db9d133bd3bb13bd5d389c4a37c830f743ffce3e47976548
SHA51283ccded4a04e2b5f43bddda97f5036ff0ce058de5396dc93e937ab40bc44a7db96c1779ec05ec1c0d72ca92eab8b1377f3566ea012670fa83532593f9dedbdbe
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
2KB
MD5dd58110617a3b271b20984a2aeea71e9
SHA13b75cce340f5a21d8f93fd3875e4e358b82e96e5
SHA256bd9cd670311bb01cefed995ef1b48e4cfb36e881f7d916867ed3111cfb76988f
SHA51260c6c22f82caafda1b035d0931e0e6d58d9c6c90f6dbb16eb7b07b8bb7014eb2b0da1095180e77ca8dce0bec927241cd63c4a45d76f1b7ae3e9e9305c29bf84b
-
Filesize
7KB
MD5e808b3b960e89c910731a2ebb96fe814
SHA17ec2d04bb3bcd0955d8b2405c34a60363e661509
SHA2564d44793c0d0381e214243241f5664090a1ee8903faff14e82e11fee0a25fef6c
SHA512366d48b9d2d9e876405ae9b773905c375aeee7e568377d44d32ea0a17d624f62f680c4c840ba6d85d3a6c5ec917d457e2699be7b60d8bbe114153db29c4fe050
-
Filesize
7KB
MD5be83b05a9753fbb56f09e50e71d4728e
SHA1cb436fa0f3c4752f8818ac1564678b624f8ea53d
SHA25613e56f2bf4a4de521d0c9c8c078ace465d831d10be3eaeddab61f62db1b04aa6
SHA51261abc95546f89212a4ada553aacb20a7699afe3adbdda72835425d1fb43a75cb9bd90743793a639ac29fa5168b4c937c78de2fc8421cbab253a4a1816624e47c
-
Filesize
5KB
MD5871607cb34aecc4801356fa0cd99a57f
SHA186a6dc819bcd91b40317c25aa1c3880471ac2062
SHA256c1c74be7cad7e94bce8f9f5700a4b90bb05c2d86e308929b6a4ff7a00e0c1a97
SHA512324ff65c57e3852f006c408f8448243a222f9f4873d5cb7fccac4f34ce70fad199ced8ad770a6e9ce69c5a7f76ba6f7da5a5651442137873358263352054caad
-
Filesize
7KB
MD5d8553db57c0da261a18121b83068f071
SHA19ae4ff12e514587676a16ba25792778887eabe02
SHA25668d10c0a287ef0a38e0ef71ddab08790ed0f7b94d0cafbaa12524b3589cc8956
SHA51288a26f72d6f35e4fe42a2ea9552b7f0b591d1b2c59a77ef394cbcd1ef3e0eae87fde15e496474c70a646d3195364d847cce378e9f0222a6bb1c763aba220c8fc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5fd477f0cc6ed024a66f9c0631d375208
SHA1f1dc2ed48b416d3e53064b389856146361fba52d
SHA2569b046cf322ab71aed14d029d0d1dc239c3b01a67f602db0809ba44b0625553a3
SHA51222327c685f64b7c328af962d6ad20d2ee17ae6b14e269c7a5573e4c95ae7ab5a307c94fce39726ef8f4d9db418696f0d9942bb250a3da3e733c6b703d307d472