Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
2a5c9a4a41281afaedf6e4032183e644_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a5c9a4a41281afaedf6e4032183e644_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2a5c9a4a41281afaedf6e4032183e644_JaffaCakes118.html
-
Size
74KB
-
MD5
2a5c9a4a41281afaedf6e4032183e644
-
SHA1
21bb74cf3f7e5b82f7a4d8a08d970acfb890bc2b
-
SHA256
a147aa29ab4474876cc60b0582d5a6fad85658942516b130bc5c3a1e84007694
-
SHA512
266982dfad575328951fd671cf82795010edbd2a6dd7396c700d925f5f01d023048ceb6aaf95ba3c3e75be462b06c7be271fe5d38e368900b36058494c47d948
-
SSDEEP
768:sCQpXH/pBsKH/E7fodzhMFro+RSXxneN/KIs5odzhtJjtmlcFSiKIRuQG:bc/pBsQiodzhMF0+RyEZqodzh/CIUQG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2720 msedge.exe 2720 msedge.exe 1032 msedge.exe 1032 msedge.exe 2364 identity_helper.exe 2364 identity_helper.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1684 1032 msedge.exe 83 PID 1032 wrote to memory of 1684 1032 msedge.exe 83 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 3656 1032 msedge.exe 84 PID 1032 wrote to memory of 2720 1032 msedge.exe 85 PID 1032 wrote to memory of 2720 1032 msedge.exe 85 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86 PID 1032 wrote to memory of 3472 1032 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a5c9a4a41281afaedf6e4032183e644_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa046f46f8,0x7ffa046f4708,0x7ffa046f47182⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6900 /prefetch:82⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7172 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6432 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6320 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,10591857126625655599,2779121028516410534,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5ba7939623cbed6540a639a9661d5b6a0
SHA114773072cb5eb95fc453018a90903d7659519389
SHA256524e15aafd1dcc1998664910655bcaff590b2cdb633c8d69fd03b52d29cad28e
SHA512efc2154b9fdc03cc30ddade8eb2daa655d80b7a3f62dfb6ebd659e906b4f16beebd9d34a53d71ed91c2220cf24f68b95a1ced49fcd16688e5bba3adb09af7d35
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5ba29fa13aba5d9691122bb4edae06b6d
SHA14d61881a2702e866206ac2755c1c1d9a38d8d764
SHA256bc911ca2859d9f4ea5b2578d577cc9d563c6aa03f5b3ca25a15449c463768309
SHA512a5a62d23d0ca480fc797c6833edcd7e9609c3f2f77672f766bf4f2e6baefe51127454ecd1fb7fada6ea2986265a295f6472f04d90ed426468767eabb358e56c7
-
Filesize
3KB
MD5aad221e1192fc7acb9f1921b5b75be43
SHA11f6988d0b93dabf58db489c186b0d0dd5a7db244
SHA2569b43e784ae5336a820213d57233edf3ec90eae8644b8a957559f382e39184f9e
SHA512943c93317ffbe85fb0547f45ac69bc8fdb945e68a02682ae51170878e97db8fea6ee47f9180424f11e4aa8c4b08482eead4f0be44e9f152785214a4d74070a5f
-
Filesize
6KB
MD58fc5746d9ed17f77e39743aa8bd33554
SHA125a86931d7dbf913b333968647d40c4f2f5cd925
SHA25637a831ebd20a461f914b67bdd27a79970999cd71b20eaa04575e4b3338508898
SHA512be3d6fe63428321c63037d642223ff279edf1d1600788fa2e6ef29d6a154c5006547140aaf941b0638e798bb6fa8e83390252aa29e71f8af378bd31cb8ab1f50
-
Filesize
7KB
MD521e9f25adfd09bfcc29d0d57602f622f
SHA190854dd755aff18494abb32e330fb6f1b86e62ad
SHA256a7f0f9c2a07effecb80a66bf1d68a748f5d9535a0bb069fb6fd0a3459c410ce1
SHA512e3c3a1069a2ff20093b348e9a5e8461cf5fdcee1384f0ed7e7bf11e9888a181ec627e0faee687914a392da1dcd10ede6eecd490684ac35cef8d49ba3153e18f8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55191afabe1bc9822a33b6fb3942aaf0b
SHA111b2172c0da632cc0915eb316b575b3780ad2093
SHA256692e33b1bcd1b05109b59ca8f61824542f42aafc67c31fd8e68e6c635e698808
SHA5121c9b70b0b123a46927730019172c75b963201d9ff5ff7446a661bddce2627db97b38670dd1f2060a6fbff13213dc7cbd088573c10c0f1fa6da9a1882925e6c43