Overview
overview
7Static
static
737f145ffe6...18.exe
windows7-x64
737f145ffe6...18.exe
windows10-2004-x64
7$PLUGINSDI...ff.dll
windows7-x64
3$PLUGINSDI...ff.dll
windows10-2004-x64
3$PLUGINSDI...lp.dll
windows7-x64
3$PLUGINSDI...lp.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ON.dll
windows7-x64
5$PLUGINSDI...ON.dll
windows10-2004-x64
5DownLite.exe
windows7-x64
3DownLite.exe
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 02:08
Behavioral task
behavioral1
Sample
37f145ffe67b1e535c368e644db902c9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37f145ffe67b1e535c368e644db902c9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallerStuff.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallerStuff.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsJSON.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsJSON.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
DownLite.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
DownLite.exe
Resource
win10v2004-20241007-en
General
-
Target
DownLite.exe
-
Size
2.1MB
-
MD5
84d44cc04348df5226b733eba1b64eb6
-
SHA1
3cc6d1a7aa6dcccf665c0c777af596d551fd953a
-
SHA256
7126b3a28108726ee7d07024bce3611ed2d68f7fe75494124a04b9314488e605
-
SHA512
40f11d74b158188b5d948d014ee82d70bd1b4a78710d7e596f961dd13fe212e6435ce2069ff4f483be3d8d23f8bf4fe478264b1c90f840660fcf4f7e0ded24b5
-
SSDEEP
49152:0gSxAEDE727h0VKMPh3UWUZQLamNg5/U6l:Q82zMPh3bUqamWc6l
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DownLite.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 400 msedge.exe 400 msedge.exe 388 msedge.exe 388 msedge.exe 3592 identity_helper.exe 3592 identity_helper.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 388 3008 DownLite.exe 86 PID 3008 wrote to memory of 388 3008 DownLite.exe 86 PID 388 wrote to memory of 4800 388 msedge.exe 87 PID 388 wrote to memory of 4800 388 msedge.exe 87 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 2556 388 msedge.exe 88 PID 388 wrote to memory of 400 388 msedge.exe 89 PID 388 wrote to memory of 400 388 msedge.exe 89 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90 PID 388 wrote to memory of 4772 388 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\DownLite.exe"C:\Users\Admin\AppData\Local\Temp\DownLite.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.java.com/getjava/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff984a646f8,0x7ff984a64708,0x7ff984a647183⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,14349098879533953077,16788612577855392056,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:23⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,14349098879533953077,16788612577855392056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,14349098879533953077,16788612577855392056,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:83⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14349098879533953077,16788612577855392056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:13⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14349098879533953077,16788612577855392056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:13⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14349098879533953077,16788612577855392056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:13⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14349098879533953077,16788612577855392056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:13⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,14349098879533953077,16788612577855392056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 /prefetch:83⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,14349098879533953077,16788612577855392056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14349098879533953077,16788612577855392056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:13⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14349098879533953077,16788612577855392056,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:13⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14349098879533953077,16788612577855392056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2940 /prefetch:13⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14349098879533953077,16788612577855392056,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:13⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,14349098879533953077,16788612577855392056,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3024 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3312
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD57eec07506f7c9dc11dd1282afb90ae8d
SHA13e5364fe55382c89dfca29cf5f91fdb187a50b2c
SHA256aabeb4c38cb8794ab2a57aab102c3527e5e2b6f42f63817ca696ba9c3926a58a
SHA51226df32e28aef6f9ef3092f91ee31020a0995991b3b4b04d9824eac21bafda9b64bf9b8ca6412b3d577c7cc72202c5ccd28a8ff8254eb2eec242193b5805fa10a
-
Filesize
654B
MD503a1d6fc851ef9003735caa758ba6214
SHA1d35132dcf190d50b6f9fd84157a26378af057bc0
SHA25606abc0ad217ab300de9cf17ec0c91609d7e26751cf815c6de406474ec8d51097
SHA512ac2e05e4cabb2d4c145d1968b88e744f89f7452a5fbe4755b10115243ffb64b4bc7776bf25583d420ed2067903cbf4aa6a46e1fe1c31cc9d04ab6ff004c29c37
-
Filesize
6KB
MD5b0fd2508a8762eb661de37cfcaf6e120
SHA152be2333919e327d47f229eee9cc964887cddc5c
SHA25682d940778bced1c0e74d51b9868933b930b170906759c05fa1caf5e4f769a6cf
SHA512d0d1788488941955c8e97b36e48ecbba611c1c7392a68b11f53775d6c19d03a5884449ecf3b966b3c40ced817cca22ac42cc034fc1500353aa5ee7beed3935dc
-
Filesize
6KB
MD5ce3b76e9eb63c519583343e9ea0b5c51
SHA1bc7f0c195ccc30cdaf2278c8985481024a700b07
SHA25615fb49efcb1d63d0b6e8b4676a827fdb67922b9772bc0c773110ba79b375dd7b
SHA51279a3e7a4ec462af7dc594cbd21de0256d3ddb27e665edd754149a7404d2f0aa90ae2a66a438963e824f0def15967160ce794e5cd9d37ebcd28ad4786a6483c60
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d690e260c9933c13f411c02baa335848
SHA16cdfc94596c419f414113aa7ddc531a481db7c43
SHA256654b3da1d68e41133bcef0c27190d73a999f963825bd61e6f8b52e2beffaab61
SHA5129cb16a43396329a04cb85b3a0e26abf470472c34d0ebe1f6b5fba801b512ccc183c7aa7b9c09917b7d0dcea2c84b345a721df4cbec838072b0be3418a021d476