Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
2fff981c04a0776290316a7583a25255_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2fff981c04a0776290316a7583a25255_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2fff981c04a0776290316a7583a25255_JaffaCakes118.html
-
Size
61KB
-
MD5
2fff981c04a0776290316a7583a25255
-
SHA1
09b7f8ba6735eb07f80e60d98f016ce596c9cc07
-
SHA256
b5b77c2f41ae003c2c3bbc90d2b1926d618e5549f023b78f27d39b369b45cc80
-
SHA512
d662521eb92c7a806ffe548e77d9a36fb3fe10e64a5ebe286f5662c36011e0040fcdde9870bd2fd392758cdfa744c251a38d33ea2a99960daf6622eb0091e0b5
-
SSDEEP
1536:/E9mVcCAd9bRNHqFFFHrL2kpzCIeqqUqA9zAPWwDCyPKd8O:s9tb7HAHrbCIlqJA9zAPWIBKd8O
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1264 msedge.exe 1264 msedge.exe 3776 msedge.exe 3776 msedge.exe 3004 identity_helper.exe 3004 identity_helper.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3776 wrote to memory of 3916 3776 msedge.exe 85 PID 3776 wrote to memory of 3916 3776 msedge.exe 85 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 216 3776 msedge.exe 86 PID 3776 wrote to memory of 1264 3776 msedge.exe 87 PID 3776 wrote to memory of 1264 3776 msedge.exe 87 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88 PID 3776 wrote to memory of 3084 3776 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2fff981c04a0776290316a7583a25255_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe67f346f8,0x7ffe67f34708,0x7ffe67f347182⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6244 /prefetch:82⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15653189392761636845,10698925557198613613,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD58eb38379dffd0c045c499dfe44d364bc
SHA1728ba9b6101ab98608a9c7a8feb2ed9da33b795f
SHA256426cb5c6e509e22e958a166d2d093807769ded86a18d78c3e05e3ef806a46774
SHA512855fd5676dcacf08fe93dc9fdc314f116951961ab39b6d325e708a8b7d7322c00ffeb5c2bb66370d891cc1ab2b4f7e8d52fc680350d95bd84582514805f416a4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD543855305d1427c1fbacf4d940c9c4aff
SHA19e60e5c0798fb45adce7ab1eeedfd35ce76c54da
SHA256da80679c964991e4b6fbb7fe915f9c0f2e2b2118de8ce63d9ac4b316b09a34db
SHA5128b3060a08434852ce79a1385bcc2752804a9ce8584518a6e9980c4c32c93881245aa47ac3d2b2d6f5a56c03b95196f913396492413cc121edd1675ea16b3f7e7
-
Filesize
1KB
MD5f021170d1216c78da6c9d1037f314d6b
SHA13f80fbcc7e0fa0b5c2468479dffc88afc373f3c5
SHA2560cb5c96fe332cb1e959e4f6242217baf75e9e670f09bded6a4afa2aac5843e85
SHA5123fa2e552e616ececd672518c46e36d4e44431eea5e5048d3579f83f850f9f2f11a6bb3b4a8e1faa8794daee82b8b6cb00a7d27da38eded771dcdc56d1332c019
-
Filesize
7KB
MD5ea5d67119e75bd9a9726951ec4ac6964
SHA13431e8adcc834e0f8b3d192a6fb1bf4688c3ea54
SHA2560478fef91debbd949f06c7c9eeeac7c22a21c50553355fc5ed5e03c33da537ab
SHA5121e6a14ec558d578cbc67882817944e9f53f4d5168452cf3ab0c1f2e8d0d5216b1877a6234cb303957a49e67f59cc9900eb863108817296ab02fc537e331e3d23
-
Filesize
7KB
MD5e66563b98fd4fab7391efb8861834ff6
SHA1c68b8d614bf3fe586be65a17e65060bdf8403ee7
SHA25625708505d4017baf954775a6893dea809f21a7a163a5753cf82106501633c32c
SHA512303c15bdae9e748ab866257a804c45157a5ab3b09d74bf641d81134cbd4f87435b875968b2d1ebdfa734c91f0e2b541159a46429f0e3c95032eded8a9edeb02e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a876447c-2acd-419b-8888-64728c12aff2.tmp
Filesize6KB
MD5a8c84fba2de7789a5d720920e03ef311
SHA1dbe48b82c7266f8f5154e1f4bdc903e312357ce0
SHA2566ce02905162982b5a29c7366e44709d54d33c33b01f0307a79b2c4df7886a9f6
SHA5120ace6393cfc590804057d2c9df63b48e01ae5453dac920a6ed96544638612500ddb3c7b73f392c3467df58bfcc573fa03237ae67dca8610aadbb1159ff67cd87
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59c866c2e9200a1f250b34b84b0b087ea
SHA1492f3b7942b61e5ee16f1ec7cc1b0740927dd8cf
SHA25654a98989fbffc4c4260ad94a1d039e64ea4c8009a9f890418713ceaeacd50cb1
SHA512090cee6a2c417c44360d59bdab054a0b10b17499202d761cb497d3cee4ce11e84c55a95b2f7bed4ddae775e9f1b99c2aace868e478bbdb0c4213a0c646d9a480