Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
2a1215af67e7065747fa7ba1851a8bcc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a1215af67e7065747fa7ba1851a8bcc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2a1215af67e7065747fa7ba1851a8bcc_JaffaCakes118.html
-
Size
51KB
-
MD5
2a1215af67e7065747fa7ba1851a8bcc
-
SHA1
2d9a65713ac504af593a00b69cd3ec4d1efc16f9
-
SHA256
78122501b3baf8b324ae35cf4f7ea009f53b3b2e2614163c1dc63f76b15e75d6
-
SHA512
eb192d4e07088be90be30c2ce48f1cd8fc3f085bdcf21852395a00d7558a40219451314ec622939dfa523e7a84a1c820a6c4a0b2449325bb5a1a948c0b97d97e
-
SSDEEP
768:9DT9TDCSXh6dqiPrF6zNI+rzWz0CIb4Gs9FMSFk3xv4PIgF0i6HBZt0G1AfV:9DTNmfzF6z49IE3PShm0i6HBZt0G1AN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 652 msedge.exe 652 msedge.exe 3056 identity_helper.exe 3056 identity_helper.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 652 wrote to memory of 876 652 msedge.exe 83 PID 652 wrote to memory of 876 652 msedge.exe 83 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 460 652 msedge.exe 84 PID 652 wrote to memory of 4080 652 msedge.exe 85 PID 652 wrote to memory of 4080 652 msedge.exe 85 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86 PID 652 wrote to memory of 2304 652 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a1215af67e7065747fa7ba1851a8bcc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff877c046f8,0x7ff877c04708,0x7ff877c047182⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,62402439931007053,17297661659413548040,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\06959600-dea6-48ed-b4a8-00ff6ef42f6f.tmp
Filesize6KB
MD5a95422d4723f9ebb4da48f74b2887958
SHA141caf016b48975258af509102c384e385c5c9a3b
SHA256990e14858e6a231d33b9bbc538b3b1d08e6947d86a1ea62d7069b0d644f2ef92
SHA512cac6a91cfd89f237abf9a695990f0d8d65a333823a15169c10923a04d7341963957743f2cd1ddb80fefe7b676a0f524dc99b19ffac55432d1013ca231c630bc8
-
Filesize
23KB
MD52f24e0f5d2c2997a89fb4a8d943c141f
SHA199515bde1a5bf72105116ac902ccf3db1dd3df29
SHA25660c9ecaf27ba56d7c35aa78c329aa7dfa586e6c71ed3cdd0019ba7e767b18aaf
SHA5120f4c5508dfdcf0ef63141df8d29c76e219d2ec433d59d37d7f17e110b455f24235fd0bc4f539ad5adc368285536d73f57dc4e21e3201dfd5753e76789208989d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD54638ad179b53ea6fbcf2357f5e51bb2e
SHA1eb421f5d13abf4cf9b7bdfa7c5ba13927ab756d9
SHA25657929821d38dd528378401f8fa417bb9fcf89eb2a43cc5f00012230895894843
SHA51202eb9afa9e15b2f9a768dfb219a2dca5c4a8f7de729fd3d93fa9d6be40fd4ec27c939836bbcd01b3e5642ec29b03aae36d16cce5d613a7ea765dc6bdd82f2a9c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD57a2860d89479d36faae3f22f3989920b
SHA1150756f4a59c21714467fe380ff00515a0bb1411
SHA256a19dae9491f1caacb78c92ef6e284e983e39bbd7745e780d2f98e5b64de7d149
SHA512ebbc0d6569e2b57afeafb65800d7c4f04395d176bd1798e605a421b4ee9e1b7b166560d30bb15b9ca8539a0b4e733f7458d78ffb2a52ebfd4832f53203263d7f
-
Filesize
1KB
MD5a6315ac7976c39fb345897389c89d4f5
SHA13bf24ead43f10b66cf75da8d9966e65e378b2b61
SHA256c5f328bb0bdfebfe68e948e62ea8ffbd23f9ce32bec1795c1c61684c53ad62d4
SHA512ddf530b395053d123183d67f652e1150f64e6b6d35a1704411568ac1ae3676114f05d803827bf74bd134c4d4f170ed9c90b677ce90e06332111229c47fde2ce3
-
Filesize
6KB
MD5d17e44d10d6f47679325908c4cf90ca4
SHA1c6d6c0d4e21df4e62a30133b9776bd6efa0c690d
SHA25662ae9f1f256e3df24a11243498eb9c8103fdfe6d99daa76333d152f8ac84aa05
SHA51286d7fa7ffd1a5e3f363f065dc45694896159ed7a0b2985e27f0fe7f52f6b9d64e581d9e748d8d239f86c1926c47ddb5d54d3e63aaa06fc849f1b97508edc1d36
-
Filesize
6KB
MD58cd985add7e36ba94768d95e62ee7606
SHA11583eebd134091d0f8629bb32b4494d429dd6684
SHA2563c287efac7cf8787e0d9f7802343b9235e623dfb9ecdca463883374ae6ce86c4
SHA5126123244a8780a769543d111f9176d3e85cd4a866c79d287d34d5bb9ef419047037d981581dfbb7c0e736fd18b9f5d564d4fe0e8024688f0154a0e9e4e8ba8cca
-
Filesize
6KB
MD50db8c5208691387a788f44298aa03011
SHA10cbb727373e70d1d12cc7283d1d1e6555411a64c
SHA2563fb91ba7341634a86fa9e0edd1fe65588f14beedca0575d090c7e85cb19f1dbc
SHA51271ef3ecb0c328066fcafb5f4a84a952e827b72f1f72189e4931b8e28771faa3693001c12838aa7abd803f9d8bc705d15f29d77ee4d115b12474c81ab876dc57d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f6bc4b471957a160fbe600e78fcee4b7
SHA181eb6cba92e157148a3effdf57afe3f3d38cc65c
SHA256521d35594c2065fb16c933a043c4d4f6f040ddffb44a0ad4a2c5e8a8d96a36cf
SHA512ce6d6cb8111778d0be9517ffb7ab483aacb5649193d515362559b5ecbf897cbba3fea7c688010db9f8cd46483fc6d34f4a77026ac6a2e8bb15fa1439009fbf4d